350 | IETE TECHNICAL REVIEW, Vol 23, No 6, 2006 |
2. GENERIC WATERMARKING SCHEME A generic watermark embedding process is as shown in Fig 1. The extraction process of watermark from a watermarked signal is shown in Fig 2. There are a number of desirable characteristics that a watermark should exhibit. It at least should comply with the following two basic requirements of image watermark:
In fact, the two requirements contradict each other from the view of signal processing. The key to the watermarking technique is to compromise between the transparency and the robustness. Watermarking on a signal n(t) is given by the following equation |
s(t) = P[ f (t)] + n(t) (1)
To satisfy this condition it is reasonable to consider f(t) to represent a bit stream, i.e. to consider a digitized version of f(t) – the vector fi – to be composed of a set of elements with values 0 or 1. This binary code can be generated by using a key or a set of keys, which, when reconstructed, is compared to the key(s) for the purpose of authentication of the data. However, this requires the distribution of the keys (public and/or private). The principal design challenge is to embed the watermark so that it reliably fulfils its intended task. For copy protection applications, the watermark must be recoverable even when the watermarked signal undergoes a reasonable level of distortion, and for tamper assessment applications, the watermark must effectively characterize the signal distortions. Security of a system comes from the uncertainty of the key. Without access to this information, the watermark cannot be extracted or be effectively removed or forged. It assumes presence of an established key management system that securely assigns required codes to the rightful watermark embedding and extraction parties. Watermarking is in an evolution phase and currently researchers are developing general guidelines for effective watermarking algorithm design, improving reliability within the constraints of computational complexity and tailoring to the constantly changing needs of multimedia industries. Although there are commercially available digital watermarking systems, the area is still in its infancy. 3. TYPES OF WATERMARKS Many watermarking approaches have been proposed till date [1,4]. A broad classification of watermarks is based on; perceptibility, robustness, inserted media, processing method and necessary data for extraction. Perceptibility and robustness For most applications two basic criteria used in evaluating a watermark scheme are perceptual quality and robustness to intentional/unintentional attacks that tend to remove the watermarks [5-7]. The watermarks inserted should be transparent i.e. they should not interfere with the media content. |