Forensic Watermarking for Secure Multimedia Distribution

Forensic Watermarking for Secure Multimedia Distribution

Farook Sattar, Dan Yu
Copyright: © 2009 |Pages: 20
ISBN13: 9781605662046|ISBN10: 1605662046|ISBN13 Softcover: 9781616925000|EISBN13: 9781605662053
DOI: 10.4018/978-1-60566-204-6.ch016
Cite Chapter Cite Chapter

MLA

Sattar, Farook, and Dan Yu. "Forensic Watermarking for Secure Multimedia Distribution." Socioeconomic and Legal Implications of Electronic Intrusion, edited by Dionysios Politis, et al., IGI Global, 2009, pp. 261-280. https://doi.org/10.4018/978-1-60566-204-6.ch016

APA

Sattar, F. & Yu, D. (2009). Forensic Watermarking for Secure Multimedia Distribution. In D. Politis, P. Kozyris, & I. Iglezakis (Eds.), Socioeconomic and Legal Implications of Electronic Intrusion (pp. 261-280). IGI Global. https://doi.org/10.4018/978-1-60566-204-6.ch016

Chicago

Sattar, Farook, and Dan Yu. "Forensic Watermarking for Secure Multimedia Distribution." In Socioeconomic and Legal Implications of Electronic Intrusion, edited by Dionysios Politis, Phaedon-John Kozyris, and Ioannis Iglezakis, 261-280. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-204-6.ch016

Export Reference

Mendeley
Favorite

Abstract

This chapter discusses on forensic tracking through digital watermarking for secure multimedia distribution. The existing watermarking schemes are elaborated and their assumptions as well as limitations for tracking are discussed. Especially, an Independent Component Analysis (ICA) based watermarking scheme is presented, which overcomes the problems of the existing watermarking schemes. Multiple watermarking techniques are used where one watermark is used for ownership verification and the other one is used to identify the legal user of the distributed content. In the absence of a priori information, i.e. the original data, original watermark, embedding locations as well as the strength, our ICA technique provides efficient watermark extraction scheme with the help of side information. The robustness against common signal processing attacks is presented. Lastly, the challenges in the forensic tracking through digital watermarking techniques are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.