...Watermarking: Legalities of Digital Media Derrick Harper Course name and number Instructor name Outline I. Introduction II. History III. The Basics of Watermarking IV. Watermarking Applications V. A Simple Watermark: Patchwork VI. Current Work in Watermarking VII. Conclusion VIII. Works Cited Introduction It's no news to anyone that's reading this that the meteoric rise of the Internet in recent years has significantly increased the availability of all forms of media. Nowhere is this more obvious than in the realm of commercial musical recordings, where Napster and other internet-based distribution systems have made incredible volumes of musical content widely available, all without the consent of the music's originators. This situation, though, is not unique to the music industry, as photographers, filmmakers, and other content-originators all have the same problem to varying degrees. The solution, and even the need for a solution, to this problem of copyright infringement is still a topic that is open to great debate, but there is no debating the fact that some interesting and novel technology has been designed to help. Digital image watermarking, the practice of secretly embedding a piece of information in an image, is one of the more interesting of these technologies, and deserves some consideration. It is the purpose of this paper to give the reader an overview of watermarking and the diverse benefits that it offers. We begin with a brief...
Words: 3166 - Pages: 13
... To generate the watermark an input frame is scanned to compute the , which represents the 128-bit hash value MD5 cryptographic function. The watermark is nothing but the bits of digital signature of hash value and secretes key . In the initial stage we extract the frames from the video sequence. The watermark generation process shown in Fig. 2. is explained in following steps: 1. The hash value is initialized to some arbitrary fixed value. 2. The position of the Last Non Zero (LNZ) level for each block is stored so that it can be used while extracting the watermark. 3. The value of the JPEG quantization matrix corresponding to LNZ is set to 1 so that after embedding the watermark bit the pixel value vary by plus or minus 1 instead of plus or minus . This modification in quantizer value leads to less distortion in video signal. Fig. 2 Watermark Generation 4. The value of the JPEG quantization matrix corresponding to LNZ is set to 1 so that after embedding the watermark bit the pixel value vary by plus or minus 1 instead of plus or minus . This modification in quantizer value leads to less distortion in video signal. 5. Set the Least Significant Bit (LSB) of LNZ to zero. 6. Update the hash value by applying the hash function to its previous value and all the coefficients in block. 7. This process is repeated for all the blocks of video frame. After all blocks are scanned the Digital Signature Algorithm (DSA) is applied on the final hash value...
Words: 708 - Pages: 3
...A Review of Wavelet-domain Watermarking Techniques Mukul Salhotra, Shivam Maurya, Shashvat Jaiswal, Amit Kumar Singh Department of CS/ICT, Jaypee University of Information Technology Abstract--As networking continues to grow exponentially, the Intellectual Property Rights (IPR) can be obtained and reproduced easily. These threats create a high demand for a content protection technique such as digital watermarking; which is one of the most efficient ways to protect the digital properties in recent years. Image watermarking techniques are frequently applied in the transform and spatial domains to achieve desired secure and robust protection. This paper provides an overview of the wavelet-based watermarking techniques available for medical images until now. In this paper the major methods have been analyzed along with their advantages & disadvantages. Keywords: Discrete Wavelet Transform, Medical image watermarking, ROI, NROI, I. INTRODUCTION D igital watermarking has emerged as a research area that was originally focused on copyright protection. Also, it has been implemented in lot of domains, such as video, audio, image, and 3D graphic model. Despite the fact there are only a few medical oriented watermarking studies in the literature to date, digital watermarking will be a valuable tool for copyright protection with medical confidentiality protection, patient and examination-related information hiding, data integrity control and source identification, in Hospital Information...
Words: 3893 - Pages: 16
...Digital piracy is making up profit from illegal copying and reselling music, videos, software videogames and other digital media which requires genuine. In 2005, loses of legal media and software industry from digital piracy was $200 billion (DSTI/IND (2007). Also, Oberholzer-Gee (2010) indicates that 60% of World Wide Web broadband busy by consumers’ video, game and music sharing. To avoid this issue intellectual proprietors use various methods. In this paper is shown methods to dodge problem of digital piracy. There are two ways to protect legal digital content from piracy. Firstly, there is indirectly impact to society, where manufacturers are producing additional equipment like guitars for game “Guitar Hero” and forwarding special social services where people can play with each other via internet, so while people playing, system is checking license (Goel, 2010). In addition, companies perform free software with fewer options than paid software. Moreover, some organizations such as Free Software Association and Open Source agitation, which advert spreading software for free have helped to grapple with problem of expensive software and companies that gain from this, for example, Microsoft (Hill, 2007). Secondly, there is direct impact on users, where companies and internet providers use methods which impacts directly on users such as blocking peer-to-peer connections between users and web-sites where users can download pirated software. Furthermore, closing the sources of...
Words: 1577 - Pages: 7
...International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Assistant Professor Vidya College of engineering, Meerut, India Km. Pooja Vankateshwara institute of computer Science and technology, Meerut, India ABSTRACT Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic technique. In steganography, the possible cover carriers are innocent looking carriers (images, audio, video, text, or some other digitally representative code) which will hold the hidden information...
Words: 3246 - Pages: 13
...patients' sensitive medical records, it's always important how one also deals with medical images that should also be kept private. Health Insurance Portability and Accountability initiated on April 14, 2013 by the federal government, establishes all relevant standards to address the issue of privacy protection. The HIPAA requires for integrity and confidentiality in all of current, previous and future from hospitals, doctors, and other relevant professionals. In an era where digital technology has become of major importance, there is a series of medical images that can now be kept in digital format and become quite easy to retrieve, store and preserve. Watermarking – An Essential Aspect for the Protection of Medical Images A. Ethical reasons and relevant legislation define Medical Information Assurance & Watermarking Medical directions. USA's HIPAA and Europe's EC 95/46 Directive are the major legislations defining relevant directions. When dealing with medical information records, thus, which involve a series of clinical examinations, diagnoses, and EPR images, three major security attributes should be considered: • Confidentiality: only authorised users can view and evaluate medical information; • Availability: Scheduled accessing periods should be set when entering the information system containing the medical data; • Reliability: The information should be examined by authorised people and not changed by unauthorised ones. Additionally, it’s important for a...
Words: 2623 - Pages: 11
...| A.I.S.S.E | Jawahar Navodaya Vidyalaya,Lepakshi | Central Board Of Secondary Education | 2005-2006 | 80.40 | Mini Project: Title: Wavelet Based Palmprint Authentication System Domain :Digital Signal Processing Software: Matlab Description: Palm print based personal verification has quickly entered the biometric family due to its ease of acquisition, high user acceptance and reliability. This project proposes a palm print based identification system using the textural information, employing different wavelet transforms.The transforms employed have been analyzed for their individual as well as combined performances at feature. Major Project: Title :A Robust Image Watermarking Using 2 Level...
Words: 484 - Pages: 2
...steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective Secret inside What is steganography? What is it used for? ● ● ● Hiding the fact that you are sending messages Hiding several messages inside data Digital watermarking Kerckhoffs' principle ● ● Secure with knowlegde of the system Message can only be read with secret key What is steganography? Hiding several messages ● ● ● ● Deniable cryptography Knowledge of encrypted data No proof of how much information is stored Rubberhose (http://www.rubberhose.org) What is steganography? Digital watermarking ● ● ● ● Not really hiding information Important: not modificable Uses the hiding-property of steganography Recent: MPAA hides watermarks in movies Implementation Hiding information ● ● ● ● Text / Webpages Images Audio Video Implementation Text / Webpages ● ● ● ● ● Use of a codebook Layout of texts Every Nth character Use of whitespaces and newlines Can be difficult to detect and decode Implementation Text / Webpages In the midway of this our mortal life, I found me in a gloomy wood, astray Gone from the path direct: and e'en to tell...
Words: 681 - Pages: 3
...Teleputers: Communication and Information New technology for communication is growing rapidly. Health care systems are taking advantage of new communications to make organizations more efficient, effective, and user friendly. These systems have superior advantages, but with the many advantages noted there are also disadvantages. The health care system has to decide if the financial impact of changing its system is beneficial in the long run. Because technology is always updating, incorporating a new communication system may only be useful for a short time. Immense growth in medical knowledge and technology spawned an era of specialization in which doctors focused on particular aspects of health called, ‘”specialization” (DuPre, p. 38). This paper will be discussing a new technology termed as “teleputers.” Teleputers are small mobile devices used as a computer, phone, and entertainment. In 1999 researches predicted that people would use teleputers to conduct research, play games, surf the internet, and transfer information (DuPre p. 321). Many people use smart phones. A smart phone is a mobile, hand held computer that is used as a phone, planner, clock, game and entertainment system, and much more. How is this important in health care communications? Health care systems sometimes have supportive groups to convey information through telephones and computers. These are virtual communities (Du Pre, p. 182). Having “teleputers” makes sharing information easier and more convenient...
Words: 901 - Pages: 4
...History of Cryptography Developments in cryptography | Period | Development | 2000 BC | In Egypt, hieroglyphics were used in inscriptions. | 500-600 BC | Hebrews used the atbash method for encryption. In this method, each letter of the alphabet mapped to a different letter to hide the true meaning of a word. | 487 BC | The Spartans used the scytale for encryption – messages were written on paper wrapped around a wooden rod. The paper was then unwrapped and sent. The recipient could read the message only by wrapping this paper on a rod of the same length and diameter. | 100-44 BC | Julius Caesar used an encryption method similar to the atbash method. He shifted each letter of the alphabet by a fixed number of places to send encrypted messages. | 1379 | Gabrieli di Lavinde developed the nomenclator. | 1466-1467 | The first polyalphabetic cipher was invented, which was much stronger than the nomenclator. | 1518 | Johannes Trithemius invented a steganographic cipher in which each letter was represented as a word taken from a succession of columns. | 1553 | Giovan Batista Belaso introduced the use of a passphrase as the key for a repeated polyalphabetic cipher. In 1563, Giovanni Battista Porta introduced the digraphic cipher and classified ciphers as transposition, substitution, and symbol substitution. | 1585 | Blaise de Vigenere developed the polyalphabetic substitution cipher. William Frederick Friedman published a book on cryptography, and is known as the...
Words: 1015 - Pages: 5
...problems. The outcome should be a paper with original technical contribution. Your grade on this will be judged on originality, soundness of the approach, and quality of presentation. * Example Topics: * Vulnerability Analysis * Wireless Security * Intrusion Detection * Authentication * Access Control * Authorization * DNS Security * Digital Watermarking * New Attacks * Survey Paper * You can write a paper that surveys a particular field on information security. The outcome should be a paper that summarizes the trend in the field you have chosen. Your grade will be judged on the completeness of the survey, the quality of the trend analysis, and the quality of presentation. * Example topics: * Vulnerability Analysis * Wireless Security * Intrusion Detection * Authentication * Access Control * Authorization * DNS Security * Digital Watermarking * Implementation * You can implement an existing technique, protocol, or system. The outcome should be a report that describes your implementation and a demo to the instructor and the TA. Your grade will...
Words: 1209 - Pages: 5
...DIGIT D TAL FIN NGERP PRINT TING A Proj report oject t Sub bmitted in the partial fulfilment of require t ement of the award of degree of f f BA ACHELOR OF TECHN NOLOGY IN ELE ECTRONICS AND COM CS MMUNICA TION ENGI GINEERING G ARJUN DEV A VGAN (B07 70279EC) CHALLA HIMANS SHU REDD (B070319 DY 9EC) NA ASREEN MOHSIN (B0 M 070495EC) SHYAM AS S SHISH (B07 70287EC) AJITH K G (B06007 79EC) Departm ment of El lectronics and Comm municatio Enginee on ering NATIONAL INIS STITUTE OF TECH HNOLOG CALICUT GY, Kozhikode, Kerala- 6736 K K 601, India Academic year 2010 0-2011 Department Of Electronics and Communication Engineering NATIONAL INSTITUTE OF TECHNOLOGY, CALICUT CERTIFICATE This is to certify that this project report entitled DIGITAL FINGERPRINTING is a bona fide record of the work done by final year students Arjun Devgan, Roll No. B070279EC, Challa Himanshu Reddy, Roll No. B070319EC, Nasreen Mohsin, Roll No. B070495EC, Shyam Ashish, Roll No. B070287EC and Ajith K G, Roll No. B060079EC, in partial fulfilment of the requirement of award of B. Tech. Degree in Electronics and Communication Engineering by the National Institute Of Technology, Calicut, during the academic year 2010-2011. Dr. Deepthi P.P Project Guide Department of Electronics and Communication Engineering N.I.T Calicut Dr. P. C. Subrahmaniam Head of the Department Department of Electronics and Communication Engineering N.I.T Calicut Date: April 29th, 2011 CONTENTS 1. 2. 3. 4. ABSTRACT ....
Words: 7883 - Pages: 32
...International Journal of Engineering Trends and Technology- Volume3Issue3- 2012 Hiding Messages Using Motion Vector Technique In Video Steganography P.Paulpandi1, Dr.T.Meyyappan,M.sc.,M.Phil.,M.BA.,Ph.D2 Research Scholar1, Associate professor2 Department of Computer Science & Engineering, Alagappa University,Karaikudi. Tamil Nadu,India. Abstract- Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be applied to video files too. The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. In this paper, we proposed a new technique using the motion vector, to hide the data in the moving objects. Moreover, to enhance the security of the data, the data is encrypted by using the AES algorithm and then hided. The data is hided in the horizontal and the vertical components of the moving objects. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. Keywords- Data hiding, Video Steganography,PSNR, Moving objects, AES Algorithm. I. INTRODUCTION Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Steganography is a technology that hides a user defined information within an object, a text...
Words: 2564 - Pages: 11
...Steganography: A Review of Information Security Research and Development in Muslim World Abstract Conveying secret information and establishing hidden relationship has been a great interest since long time ago. Therefore, there are a lot of methods that have been widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5,...
Words: 3746 - Pages: 15
...the development of printing press technology, this concept was slightly changed as now copying was regarded as a theft from the original content. This made the writers of the past to make copyright laws that would protect the individual work The three systems defined in this paper deal with copyright issue of digital media. The system defined here are the ones that are in bad need of a proper copyright scheme as these digital media content are the ones that are most effected by the piracy and copying issues. The copying of any of these contents results in the decrease revenue for the author, hence discouraging the author for producing a better kind of media for later use. The first system defined is the Giovanni, which is digital watermarking technology for audio media. The basic idea of this company is to produce audio that is watermarked with waves that are inaudible to the human ear. Giovanni maintains the functionality of copyright targets by keeping archives and provide maintenance to the author. Yet, it does not restrict any access of the eligible person. The second system proposed is the Content Scrambling System, which is embedded in DVDs and DVD players. This system provides copyright by embedding encrypted region codes into the DVDs that allows the DVDs to be played in only the available regions encoded in the contents of the DVD. The DVD player then...
Words: 440 - Pages: 2