IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Copyright Protection in Virtual Communities through Digital Watermarking

Copyright Protection in Virtual Communities through Digital Watermarking
View Sample PDF
Author(s): Huayin Si (University of Warwick, UK)and Chang-Tsun Li (University of Warwick, UK)
Copyright: 2008
Pages: 7
Source title: Virtual Technologies: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Jerzy Kisielnicki (Warsaw University, Poland)
DOI: 10.4018/978-1-59904-955-7.ch098

Purchase

View Copyright Protection in Virtual Communities through Digital Watermarking on the publisher's website for pricing and purchasing information.

Abstract

Although the development of multimedia processing techniques has facilitated the enrichment of information content, and the never-ending expansion of interconnected networks has constructed a solid infrastructure for information exchanges, meanwhile, the infrastructure and techniques have also smoothed the way for copyright piracy in virtual communities. As a result, the demand for intellectual property protection becomes apparent and exigent. In response to this challenge, digital watermarking has been proposed to serve this purpose. The idea of digital watermarking is to embed a small amount of secret information—the watermark—into the host digital productions, such as image and audio, so that it can be extracted later for the purposes of copyright assertion, authentication and content integrity verification, and so forth. Unlike traditional watermarks printed on paper, which are visible to human eyes, digital watermarks are usually invisible and can only be detected with the aid of a specially designed detector. One characteristic distinguishing digital watermarking from cryptography, which separates the digital signature from the raw data/content, is that digital watermarking embeds the signature in the content to be protected. The superiority of this characteristic is that while cryptography provides no protection after the content is decrypted, digital watermarking provides “intimate” protection, because the digital signature/secret information has become an inseparable constituent part of the content itself after embedding. Because of the very characteristic, digital watermarking requires no secret channel for communicating the digital signature that cryptography does. So in the last decade, digital watermarking has attracted numerous attention from researchers and is regarded as a promising technique in the field of information security. Various types of watermarking schemes have been developed for different applications. According to their natures, digital watermarking schemes could be classified into three categories: fragile watermarking, semi-fragile watermarking and robust watermarking. The schemes of the first two categories are developed for the purposes of multimedia authentication and content integrity verification, in which we expect the embedded watermark to be destroyed when attacks are mounted on its host media. More emphases of these schemes are placed on the capability of detecting and localizing forgeries and impersonations. The main difference between the two is that semi-fragile watermarking is tolerant to non-malicious operations, such as lossy compression within a certain compression ratio, while fragile watermarking is intolerant to any manipulations. Robust watermarking, on the other hand, is intended for the applications of copyright protection, wherein the watermarks should survive attacks aiming at weakening or erasing them provided the quality of the attacked content is still worth protecting. Therefore, the emphasis of robust watermarking schemes is placed on their survivability against attacks. This article is intended to focus on robust watermarking schemes for the application of copyright protection. See Li and Yang (2003) and Lin and Chang (2001) for more details about fragile and semi-fragile schemes.

Related Content

Kumar Shalender, Babita Singla. © 2024. 11 pages.
R. Akash, V. Suganya. © 2024. 32 pages.
Prathmesh Singh, Arnav Upadhyaya, Nripendra Singh. © 2024. 14 pages.
Arpan Anand, Priya Jindal. © 2024. 13 pages.
Surjit Singha, K. P. Jaheer Mukthar. © 2024. 26 pages.
M. Vaishali, V. Kiruthiga. © 2024. 14 pages.
Ranjit Singha, Surjit Singha. © 2024. 21 pages.
Body Bottom