Skip to main content

Traitor Tracing After Visible Watermark Removal

  • Conference paper
  • First Online:
Book cover Digital Forensics and Watermarking (IWDW 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11378))

Included in the following conference series:

Abstract

Watermarks are often used to protect copyright-protected videos from illegal re-distribution. More specifically, a unique watermark that represents the receiver’s identifier is embedded into the video. In this way, malicious users can be identified when they leak their received version of the video. However, when the watermark is embedded as visible text in the video, it is easy for digital pirates to delete it such that they can no longer be identified. Therefore, copyright owners will benefit from a technique that allows the detection of a visible watermark when it is removed. This paper demonstrates how a visible watermark indirectly generates imperceptible variations over the entire video. As such, these variations in the non-watermarked area can be used as an alternative watermark representation, and thus enable watermark detection even after watermark removal. The experimental results prove that the watermark can be detected as long as the quality of the watermarked video is not significantly reduced, especially if the originally-distributed watermarked video has a high quality. Moreover, the watermark should be embedded into a video with sufficient motion. In conclusion, the proposed technique enables copyright-owners to identify pirates when they illegally distribute visibly-watermarked videos, even when the watermarked area is removed.

This work was funded by the Research Foundation – Flanders (FWO) under Grant 1S55218N, IDLab (Ghent University – imec), Flanders Innovation & Entrepreneurship (VLAIO), and the European Union. Furthermore, the computational resources (STEVIN Supercomputer Infrastructure) and services used in this work were kindly provided by Ghent University, the Flemish Supercomputer Center (VSC), the Hercules Foundation and the Flemish Government department EWI.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Asikuzzaman, M., Pickering, M.R.: An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol. (2017). https://doi.org/10.1109/TCSVT.2017.2712162

    Article  Google Scholar 

  2. Bossen, F.: Common test conditions and software reference configurations. Technical report, JCTVC-L1100, ITU-T Joint Collaborative Team on Video Coding (JCT-VC), January 2013

    Google Scholar 

  3. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers, San Francisco (2008)

    Google Scholar 

  4. Feng, B., Weng, J., Lu, W.: Improved algorithms for robust histogram shape-based image watermarking. In: Kraetzer, C., Shi, Y.Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 275–289. Springer, Berlin (2017). https://doi.org/10.1007/978-3-319-64185-0_21

    Chapter  Google Scholar 

  5. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283–301 (1998)

    Article  Google Scholar 

  6. Hu, Y., Kwong, S., Huang, J.: Using invisible watermarks to protect visibly watermarked images. In: Proceedings of IEEE International Symposium Circuits Systems (ISCAS). vol. 5, pp. V-584–V-587, May 2004

    Google Scholar 

  7. Huang, C.H., Wu, J.L.: Inpainting attacks against visible watermarking schemes. In: Proceedings of SPIE, vol. 4314 (2001). https://doi.org/10.1117/12.435421

  8. Huang, C.H., Wu, J.L.: Attacking visible watermarking schemes. In: Proceedings of IEEE International Conference on Multimedia Computing Systems (ICMCS), vol. 6, no. 1, pp. 16–30, Feburary 2004. https://doi.org/10.1109/TMM.2003.819579

    Article  Google Scholar 

  9. Kankanhalli, M.S., Ramakrishnan, K.R.: Adaptive visible watermarking of images. In: Proceedings of IEEE International Conference on Multimedia Computing Systems (ICMCS), vol. 1, pp. 568–573, July 1999. https://doi.org/10.1109/MMCS.1999.779263

  10. Mareen, H., De Praeter, J., Van Wallendael, G., Lambert, P.: A novel video watermarking approach based on implicit distortions. IEEE Trans. Consum. Electron. 64(3), 250–258 (2018). https://doi.org/10.1109/TCE.2018.2852258

    Article  Google Scholar 

  11. Mohanty, S.P., Ramakrishnan, K.R., Kankanhalli, M.: A dual watermarking technique for images. In: Proceedings of ACM International Conference on Multimedia, pp. 49–51. ACM, New York (1999). https://doi.org/10.1145/319878.319891

  12. Siddique, H.: Game of thrones fifth season episodes leaked online. The Guardian, 12 April 2015. https://www.theguardian.com/tv-and-radio/2015/apr/12/game-of-thrones-fifth-season-episodes-leaked-online

  13. Sullivan, G.J., Ohm, J.R., Han, W.J., Wiegand, T.: Overview of the high efficiency video coding (HEVC) standard. IEEE Trans. Circuits Syst. Video Technol. 22(12), 1649–1668 (2012). https://doi.org/10.1109/TCSVT.2012.2221191

    Article  Google Scholar 

  14. Tew, Y., Wong, K.: An overview of information hiding in H.264/AVC compressed video. IEEE Trans. Circuits Syst. Video Technol. 24(2), 305–319 (2014). https://doi.org/10.1109/TCSVT.2013.2276710

    Article  Google Scholar 

  15. Wong, P.W.: A watermark for image integrity and ownership verification. In: Proceedings of IS&TS PICS, pp. 374–379. Society for Imaging Science & Tehnology (1998)

    Google Scholar 

  16. Yang, G., Qi, W., Li, X., Guo, Z.: Improved reversible visible watermarking based on adaptive block partition. In: Kraetzer, C., Shi, Y.Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 303–317. Springer, Berlin (2017). https://doi.org/10.1007/978-3-319-64185-0_23

    Chapter  Google Scholar 

  17. Zhang, X., Wang, Z.J.: Correlation-and-bit-aware multiplicative spread spectrum embedding for data hiding. In: Proceedings of IEEE International Workshop Information Forensics Security (WIFS), pp. 186–190, November 2013. https://doi.org/10.1109/WIFS.2013.6707816

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hannes Mareen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mareen, H., De Praeter, J., Van Wallendael, G., Lambert, P. (2019). Traitor Tracing After Visible Watermark Removal. In: Yoo, C., Shi, YQ., Kim, H., Piva, A., Kim, G. (eds) Digital Forensics and Watermarking. IWDW 2018. Lecture Notes in Computer Science(), vol 11378. Springer, Cham. https://doi.org/10.1007/978-3-030-11389-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-11389-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-11388-9

  • Online ISBN: 978-3-030-11389-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics