Forensic Watermarking for Secure Multimedia Distribution

Forensic Watermarking for Secure Multimedia Distribution

Farook Sattar (Nanyang Technological University, Singapore) and Dan Yu (Hewlett-Packard, Shanghai, China)
Copyright: © 2009 |Pages: 20
DOI: 10.4018/978-1-60566-204-6.ch016
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

This chapter discusses on forensic tracking through digital watermarking for secure multimedia distribution. The existing watermarking schemes are elaborated and their assumptions as well as limitations for tracking are discussed. Especially, an Independent Component Analysis (ICA) based watermarking scheme is presented, which overcomes the problems of the existing watermarking schemes. Multiple watermarking techniques are used where one watermark is used for ownership verification and the other one is used to identify the legal user of the distributed content. In the absence of a priori information, i.e. the original data, original watermark, embedding locations as well as the strength, our ICA technique provides efficient watermark extraction scheme with the help of side information. The robustness against common signal processing attacks is presented. Lastly, the challenges in the forensic tracking through digital watermarking techniques are discussed.
Chapter Preview
Top

Multimedia Distribution Strategy Through Digital Watermarking

The rapid growth of networked multimedia systems has increased the need for the protection and enforcement of intellectual property (IP) rights of digital media. The IP protection for multimedia distribution in the Internet can be elaborated as follows:

  • -

    Ownership Identification: the owner of the original Work must be able to provide the trustful proof that he/she is the rightful owner of the content.

  • -

    Transaction Tracking: the owner must be able to track the distributions of the Work, so that he/she is able to find the person who should be responsible for the illegal replication and re-distribution.

  • -

    Content Authentication: the owner should be able to detect any illegal attempts to alter the Work.

This chapter concentrates on the task of forensic tracking for multimedia distribution applications. Let consider the scenario when an owner would like to sell or distribute the Work for the registered users only. To enforce the IP rights, two primary problems are to be solved. First of all, the owner needs to prove that he/she is the legal owner of the distributed content. Secondly, if the data have been subsequently copied and redistributed illegally, how it is possible for the owner to find the person who is responsible for the illegal copying and redistribution of the data (see Figure 1).

Figure 1.

A multimedia distribution system, where the digital content could be illegally redistributed to an illegal user.

Complete Chapter List

Search this Book:
Reset