Watermarking

Security in Computing (3rd Edition)

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Watermarking Doug Tygar
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How can we mark data We want to protect data: Video, sound, music (Digimarc, Intertrust, etc) Programs (Collberg, Thomborson) Statistical data Examples of “traditional” protection methods: False entries in biographical dictionaries Copyright notices Licensing agreements Secure coprocessors
Background image of page 2
Watermarking Watermarking: include low level bit data that marks information Either on a per-copy basis or a per-provider basis Example: temperature database slightly adjust temps to mark uniquely Store copies of info released If reused, prove using similarities But what if adversary changes low-level info?
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Can watermarking work for data? It is not clear how applicable watermarking will be for data A perfect technique (immune against strong tampering) is probably impossible But some watermarking techniques may be usable DMCA: removing watermarks is illegal In this talk, I survey watermarking techniques for photographic data.
Background image of page 4
Motivation Intellectual property is important for the Internet IP (images) are valuable Costly to create high quality images Users are attracted by good design Binary data is trivial to copy The web is a headache for copyright protection Many methods for free data exchange Watermarking is seen as the white knight of copyright protection
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Part 1: Making Image Watermarks
Background image of page 6
Secrets of a image watermarking salesman This slide can transform you into an experienced watermarking salesman Show two identical images Claim that one is watermarked Assert that it’s robust against attacks Get signature on big $ contract
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Companies to apply to Digimarc Bluespike MediaSec Signafy Signum (signumtech.com) ARIS (musicode.com) Intertrust But also some of the 2-3 letter companies IBM HP NEC
Background image of page 8
Applications Copyright protection Content owner embeds a secret watermark Proof of ownership by disclosing the secret key Fingerprinting Embed a serial number describing the recipient Later we can detect which user copied the image Authentication Integrity verification A fragile watermark assures integrity Content labeling Rights management Galaxy group (DVD watermarking): IBM, NEC, Sony, Hitachi, Pioneer Secure Digital Music Initiative Intertrust Content protection
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Watermarking concepts robust fragile Watermarking technique Key symmetric asymmetric Watermarks visible invisible Verifiability private public Original necessary yes no
Background image of page 10
Visible watermarks Visible watermarks are used in special domains Vatican library Swiss paper museum Issues with visible watermarks Content producer does not like to degrade the image
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 39

Watermarking - Watermarking Doug Tygar How can we mark data...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online