FAQ

Digital Watermarking Frequently Asked Questions (FAQ)

Please help us: The FAQs below are preliminary and not complete. Anybody having an answer to an open item is encouraged to send us his contribution. We will continaully work on the FAQs and update them. Thanks!

Last modified:  OCT 14, 2001

Introduction

This document tries to answer question frequently asked on the Watermarking mailing list. To join this list, please refer to the subscription information on https://www.watermarkingworld.org/ml/.

Many people have contributed to this FAQ. In alphabetical order: 

  • Fabien Petitcolas
  • Jong-Hyeon Lee
  • Matthieu Brunet
  • Stefan Katzenbeisser
  • Martin Kutter

General questions

  • What is the difference between “copy protection” and “copyright protection”?
    Copy protection attempts to find ways, which limit the access to copyrighted material and/or inhibit the copy process itself. Examples of copy protection include encrypted digital TV broadcast, access controls to copyrighted software through the use of license servers and technical copy protection mechanisms on the media. A recent example is the copy protection mechanism on DVDs. However, copy protection is very difficult to achieve in open systems, as recent incidents (like the DVD hack) show.
    Copyright protection inserts copyright information into the digital object without a loss of quality. Whenever the copyright of a digital object is in question, this information is extracted to identify the rightful owner. It is also possible to encode the identity of the original buyer together with the identity of the copyright holder, which allows tracing of any unauthorized copies. The most prominent way of embedding information in multimedia data is the use of digital watermarking.
    Whereas copy protection seems to be difficult to implement, copyright protection protocols based on watermarking and strong cryptography are likely to be feasible.
  • What is the difference between visible and invisible watermarking?
    Send answer.
  • What is the watermark?
    Although different authors use different meaning for the word ‘watermark’, it is mostly agreed that the watermark is what  is actually imperceptibly added to the cover-signal in order to convey the hidden data.
  • Usefulness?
    Send answer.
  • What is the original image?
    Consider the following scenario: Alice, the copyright holder, inserts her own watermark into some object, locks the original away and keeps selling the marked image. Bob can now try to insert his own watermark into the already marked object. In case of a dispute, both Alice and Bob are able to prove the presence of “their” watermark and claim ownership of the document. How can this situation be resolved?
    The “traditional” answer is: look at the objects Alice and Bob claim to be the original. Alice’s original should not contain a watermark, whereas Bob’s “original” must contain Alice’s watermark (if we assume that Bob cannot remove marks). This situation would indicate that Bob inserted his watermark after Alice and so one may conclude that Alice is the rightful owner. 
    Unfortunately, sometimes the situation is not that simple. It has been shown that a particular class of watermarking schemes, Bob can insert his watermark in a way that it also seems to be present in the copy Alice locked away (although he has no access to it). So Alice’s original contains Bob’s mark and Bob’s “original” contains Alice’s mark. This type of attack is called “inversion attack” or more “dead lock attack”. There is no way to resolve copyright ownership in this case. This result indicates that watermarking “alone”, that is without a carefully designed protocol around it, will not suffice to resolve the copyright situation.
  • Why not add the copyright information into the file format?
    One could define a new audio file format, in which the watermark is a part of the header block but is not removable without destroying the original signal, because part of the definition of the file format requires the watermark to be therein. In this case the signal would not really be literally ‘destroyed’ but any application using this file format would not touch it without a valid watermark. Some electronic copyright management system propose mechanisms like this. Such schemes are  weak as anyone with a computer or a digital editing workstation would be able to convert the information to another format and remove the watermark at the same time. Finally this new audio format would be incompatible with the existing one. Thus the watermark should really be embedded in the audio signal. 
    This is very similar to S.C.M.S. When Philips and Sony introduced the ‘S/PDIF’ (Sony/Phillips Digital Interchange Format), they included the S.C.M.S. (Serial Code Management System) which provides a way copies of digital music are regulated in the consumer market.  This information is added to the stream of data that contains the music when one makes a digital copy (a ‘clone’). This is in fact just a bit saying: digital copy prohibited or permitted. Some professional equipment are exempt for needing S.C.M.S.
    With watermarking however, the copy control information is part of the audio-visual signal and aim at surviving file format conversion and other transformations.
  • What is the difference between watermarking, steganography, and cryptography?
    While cryptography is about protecting the content of messages (their meaning), steganography is about concealing their very existence. It comes from Greek roots, literally means ‘covered writing’, and is usually interpreted to mean hiding information in other information. Examples include sending a message to a spy by marking certain letters in a newspaper using invisible ink, and adding sub-perceptible echo at certain places in an audio recording. It is often thought that communications may be secured by encrypting the traffic, but this has rarely been adequate in practice. Æneas the Tactician, and other classical writers, concentrated on methods for hiding messages rather than for enciphering them; and although modern cryptographic techniques started to develop during the Renaissance, we find in 1641 that John Wilkins still preferred hiding over ciphering because it arouses less suspicion. This preference persists in many operational contexts to this day. For example, an encrypted email message between a known drug dealer and somebody not yet under suspicion, or between an employee of a defense contractor and the embassy of a hostile power, has obvious implications.

    As the purpose of steganography is having a covert communication between two parties whose existence is unknown to a possible attacker, a successful attack consists in detecting the existence of this communication (e.g., using statistical analysis of images with and without hidden information). Watermarking, as opposed to steganography, has the (additional) requirement of robustness against possible attacks. In this context, the term ‘robustness’ is still not very clear; it mainly depends on the application. Copyright marks do not always need to be hidden, as some systems use visible digital watermarks, but most of the literature has focused on imperceptible (e.g., invisible, inaudible) digital watermarks which have wider applications. Visible digital watermarks are strongly linked to the original paper watermarks which appeared at the end of the XIII century to differentiate paper makers of that time. Modern visible watermarks may be visual patterns (e.g., a company logo or copyright sign) overlaid on digital images. The intent of use is also different: the payload of a watermark can be perceived as an attribute of the cover-signal (e.g., copyright information, license, ownership, etc.). In most cases the information hidden using steganographic techniques is not related at all to the cover. These differences in goal lead to very different hiding techniques.
  • What are ‘public watermarking’, ‘blind watermarking’, ‘semi-blind watermarking’, ‘private watermarking’, ‘non-blind watermarking’ and  ‘asymmetric watermarking’?
    There as been some confusion about the naming of various types of watermarking techniques and the main reason is that people involved in this field come from different backgrounds (in particular signal processing and computer security). On top of this some terminology has been imported from the related field of steganography.
    Originally, public watermarking and blind watermarking mean the same, but the wording was confusing with public-key watermarking and ‘signal processing people’ took over the field so only the later tends to remain. In these schemes the cover signal (the original signal) is not needed during the detection process to detect the mark. Solely the key, which is typically used to generate some random sequence used during the embedding process, is required. These types of schemes can be used easily in mass market electronic equipment or software.
    In some cases you may need extra information to help your detector (in particular to synchronise its random sequence on the possibly distorted test signal). In particular some watermarking schemes require access to the ‘published’ watermarked signal, that is the original signal just after adding the watermark. People refer to these schemes as semi-blind watermarking schemes.
    Private watermarking and non-blind-watermarking mean the same: the original cover signal is required during the detection process.
    At last, by asymmetric watermarking or  public-key watermarking, people refer to watermarking schemes with properties reminding asymmetric cryptosystem (or public key cryptosystem). No such system really exists yet although some possible suggestions have been made. In this case, the detection process (and in particular the detection key) is fully known to anyone as opposed to blind watermarking where a secret key is required. So here, only a ‘public key’ is needed for verification and a ‘private key’ (secret) is used for the embedding though. Knowledge of the public key does not help to compute the private key (at least in a reasonable time), it does not either allow removal of the mark nor it allows an attacker to forge a mark.
  • What is the difference between (semi-)fragile and robust watermarks?
    The aims of such watermarks are completely different: A (semi-)fragile watermark is a mark which is (highly) sensitive to a modification of the stego-medium. A fragile watermarking scheme should be able to detect any change in the signal and identify where it has taken place and possibly what the signal was before modification. It serves at proving the authenticity of a document. On the opposite, a robust watermark should be stuck to the document it has been embedded in, in such a way that any signal transform of reasonable strength cannot remove the watermark. Hence a pirate willing to remove the watermark will not succeed unless they debase the document too much to be of commercial interest.
    The latter form is the very challenging and attracts most research.
  • What are fingerprints?
    Fingerprints are characteristics of an object that tend to distinguish it from other similar objects. They enable the owner to trace authorized users distributing them illegally. In the case of encrypted satellite television broadcasting, for instance, users could be issued a set of keys to decrypt the video streams and the television station could insert fingerprint bits into each packet of the traffic to detect unauthorized uses. If a group of users give their subset of keys to unauthorized people(so that they can also decrypt the traffic) at least one of the key donors can be traced when the unauthorized decoder is captured. In this respect, fingerprinting is usually discussed in the context of the traitor tracing problem.
  • What is the oldest (historical) method developed/used for the purpose of ownership protection?
    The original paper watermarks appeared at the end of the 13thI century to differentiate paper makers of that time. Modern visible watermarks may be visual patterns (e.g., a company logo or copyright sign) overlaid on digital images and are widely used by many photographers who do not trust invisible watermarking techniques enough.
    In the 17th century, Claude Gellée of Lorraine (1600–1682), also known as Claude Lorrain, introduced a method for protecting his intellectual property nearly hundred years before any relevant law was introduced (the first ‘copyright’ law was the ‘Statute of Anne’ introduced by the English Parliament in 1710.) From some time around 1635 until the end of his life in 1682, Lorrain kept a book that he called the Liber Veritatis (now kept in the British Museum in London). The Liber Veritatis was a collection of drawings in the form of a sketchbook. The book was specially made for him, with a scheme of alternating pages, four blue pages followed by four white, which repeated in this manner and contained around 195 drawings. One of Lorrain’s biographers, reported that the purpose in creating the Liber Veritatis was to protect Lorrain against forgery (it is not clear ‘how far the objective of protection against forgery can be accepted as an adequate example of the book’s raison d’être’) In fact, any comparison between drawings and paintings goes to show that the former were designed to serve as a `check’ on the latter and from the Liber any very careful observer could tell whether a given painting was a forgery or not.
    Similar techniques are being used today. ImageLock, for instance, keeps a central database of image digests and periodically searches the Web for images having the same digest. Tracking systems based on private watermarks also require central databases. Unfortunately, apart from the extent of the problem (which is now global) nothing much has changed, since such services still do not provide any proof of infringement.