Explore chapters and articles related to this topic
Classification in Digital Watermarking
Published in Frank Y. Shin, Digital Watermarking and Steganography, 2017
IBM’s Tokyo Research Laboratory (TRL) first proposed the use of watermarking technology for DVD copy protection at the DVD Copy Protection Technical Working Group (CPTWG) in September 1996, and showed that the TRL’s technology can detect embedded watermarks even in the MPEG2-compressed domain. This development enables DVD playing and recording devices to automatically prevent playback of unauthorized copies and unauthorized recording using copy control information detected in digital video content. The digital data are transmitted from a transmitter-side apparatus to a receiver-side apparatus through interfaces that allow the transmission and receiving of the digital data only between the authenticated apparatuses. Copy control information indicating a copy restriction level is added to the main data recorded on the digital medium such that the main data contains a first portion containing image and/or voice information, and a second portion containing the copy control information. The digital watermark is embedded into the second portion of the main data.
Survey of Watermarking Techniques and Applications
Published in Borko Furht, Darko Kirovski, Multimedia Watermarking Techniques and Applications, 2006
There was also a need to support limited copying of video content. For example, a customer should be able to make a single copy of the broadcast video for later viewing (a.k.a. time-shifting recording), but he should not be able to make additional copies. The Copy Control Management System (CCMS) has been designed to provide that level of copy control by introducing and supporting three rules for copying: Copy_Free, Copy_Never, and Copy_Once. Two bits are needed to encode those rules and the bits are embedded into the video frames in the form of watermarks.
Survey of Watermarking Techniques and Applications
Published in Borko Furht, Darko Kirovski, Multimedia Security Handbook, 2004
There was also a need to support limited copying of video content. For example, a customer should be able to make a single copy of the broadcast video for later viewing (a.k.a. time-shifting recording), but he should not be able to make additional copies. The Copy Control Management System (CCMS) has been designed to provide that level of copy control by introducing and supporting three rules for copying: Copy_Free, Copy_Never, and Copy_Once. Two bits are needed to encode those rules and the bits are embedded into the video frames in the form of watermarks.
Block SMRT and knapsack optimization-based sequency selector for robust, imperceptible, and payload-efficient color image watermarking for binary watermark
Published in International Journal of Computers and Applications, 2023
Febina Ikbal, Rajamma Gopikakumari
The need for data security has increased considerably with rapid advancement in networking and data communication which made the exchange and access of multimedia content easier. Multimedia proliferation in the form of image, video, audio, and other forms is both a blessing and a curse. Social media platforms, with millions of users, contribute petabytes of multimedia content daily where image is an essential component. The ease with which this might be misused underscores the importance of image security in today's world. Digital watermarking [1,2] is a promising technology for multimedia security and is used for copyright protection, broadcast monitoring, copy control, authentication, tamper detection, etc. The fundamental attributes that make up a golden triangle for watermarking techniques are imperceptibility, robustness and payload. Imperceptibility indicates transparency of the watermark in watermarked data and represents its quality. Watermarks should be perceptually invisible, unless it is meant to be seen, such as company logos. The ability to extract watermark from watermarked image under different attacks is a measure of robustness. Payload or Embedding Capacity (EC) refers to the number of bits that can be embedded in the host image. Good quality, high robustness, and large payload are difficult to achieve in the design of a watermark embedding technique due to their conflicting nature.