Digital Watermarking for MPEG Video |
|||
Network Technology and Applications |
The advent of high-quality digital compression techniques (i.e. MPEG2 and MP3) and the widespread availability of Internet connectivity have not only fuelled the proliferation of e-multimedia and e-entertainment applications, but also hastened the need for copyright protection of digital multimedia contents. The SDMI (Secure Digital Music Initiative) public challenge organized by the RIAA (Recording Industry Association of America) in year 2000 clearly revealed the music industry’s urgent desire to protect digital audio contents from unauthorized use. Major movie makers have also been actively searching for suitable solutions to prevent perfect duplication of DVD video by digital pirates.
It is fairly well accepted now that encryption alone cannot solve all the piracy woes, and digital watermarking is the partner in fighting this battle. With digital watermarking techniques, secret information can be hidden intimately into the multimedia data so as to prevent unauthorized copying by non-compliant hardware, trace pirate distributors by intelligent software agents, or perform digital rights management functions over the Internet. In NTU, we have conducted substantial research and development works on MPEG video watermarking since 1999. These R&D efforts approach the issue of MPEG watermarking from several fronts:
Non-adaptive Embedding
HVS-adaptive Embedding Watermark attack is to watermarking, just as hacking is to encryption: both are intentional and potentially professional attempts to impede the proper functioning of security mechanisms. It is well accepted now that any watermark design without attack considerations is doomed to fail some time in the future. In our team, we hence pay at least equal attention to watermark attacks/counter-attacks as watermark designs. To facilitate pirate tracing in video distribution applications, different watermarks carrying distinguishing client information may be embedded at source. If a few clients requesting for the same source data get their differently marked versions together, they may “collude” (or cooperate) to remove or weaken each other’s watermarks, leading to what is commonly termed a “collusion attack”. Collusion attacks are powerful attacks because they are capable of achieving their objective without causing much degradation in visual quality of the attacked data (sometimes, visual quality may even improve after attack.). This is illustrated in Figure 2 below, where an attacked video frame looks almost as good as the original unmarked source.
Original (no watermark)
Attacked (by collusion) Watermarking is a relatively young technology that has been bestowed a commercially sensitive mission. Besides practical and empirical investigations, we also look deeper into its fundamental performance models and limits, in an effort to find theoretical assurance in its potentials. With such diverse ongoing R&D activities, we hope to better the understanding of the technology and contribute towards its successful adoption by the industry.
|
||
Home | Site Map |
Feedback |
About |