MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video

  • J. P. M. G. Linnartz
  • J. C. Talstra
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1485)


In this paper we propose a method to watermark digital video content in such a way that detection in consumer electronics equipment is possible with very little hardware (a few thousand gates). The method proposes to modify the MPEG encoding procedure to choose the so-called Picture Type of video-frames not from a regular sequence but according to a message one would like to transmit. Removal of this embedded message, the PTY-Mark, from the resulting MPEG-stream without jeopardizing video quality is only possible after a complete MPEG decoding and re-encoding cycle. We investigate the modifications to current MPEG encoders which are necessary to accommodate these PTY-Marks. Based on tests we comment on their feasibility. Detection of watermarks without secrets is very reminiscent of “public-key” cryptography. We discuss this relationship by contrasting PTY-marks with pixelwatermarking.


Watermarking copy-protection MPEG DVD-video 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    L. F. Turner, “Digital data security system.” Patent IPN WO 89/08915, 1989.Google Scholar
  2. 2.
    J.T. Brassil, N.F. Maxemchuk, S. Low, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying”, Proceedings of IEEE Infocom 94. Toronto, June 1994, pp. 1278–1287Google Scholar
  3. 3.
    Caronni G.: “Assuring Ownership Rights for Digital Images”, Proceedings of Reliable IT Systems, VIS ’95, Vieweg Publishing Company, Germany, 1995Google Scholar
  4. 4.
    K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding secret information into a dithered multi-level image”, in Proc., 1990 IEEE Military Communications Conference, pp. 216–220, 1990.Google Scholar
  5. 5.
    E. Koch, J. Rindfrey, and J. Zhao: “Copyright protection for multimedia data”, in Proc. of the Int. Conf. on Digital Media and Electronic Publishing, 1994.Google Scholar
  6. 6.
    E. Koch, J. Zhao: “Towards Robust and Hidden Image Copyright Labeling”, Proceedings IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, June, 1995, pp. 452–455.Google Scholar
  7. 7.
    M. D. Swanson, B. Zhu, and A. H. Tewfik, “Transparent robust image watermarking”, in IEEE Int. Conf. onImage Processing, 1996Google Scholar
  8. 8.
    G. B. Rhoads, “Indentification/authentication coding method and apparatus.”, World Intellectual Property Organization, WIPO WO 95/14289, 1995.Google Scholar
  9. 9.
    W. Bender, D. Gruhl, N. Morimoto, “Techniques for Data Hiding”, Proceedings of the SPIE, 2420:40, San Jose CA, USA, February 1995Google Scholar
  10. 10.
    O. Paatelma and R. H. Borland, “Method and apparatus for manipulating digital data works”, WIPO Patent WO 95/20291, 1995.Google Scholar
  11. 11.
    L. Holt, B. G. Maufe, and A. Wiener, “Encoded marking of a recording signal.” UK Patent GB 2196167A, 1988.Google Scholar
  12. 12.
    I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for images, audio and video”, in IEEE Int. Conference on Image Processing, vol. 3, pp. 243–246, 1996.Google Scholar
  13. 13.
    I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “A secure, robust watermark for multimedia”, in Information Hiding: First Int. Workshop Proc., R. Anderson, ed., vol. 1174 of Lecture Notes in Computer Science, pp. 185–206, Springer-Verlag, 1996Google Scholar
  14. 14.
    C. I. Podilchuk and W. Zeng, “Image-Adaptive Watermarking Using Visual Models”, IEEE Trans. on Selected Areas of Communications vol 16, pp 525–539, 1998.CrossRefGoogle Scholar
  15. 15.
    J. J. K. O. Ruanaidh, W. J. Dowling, and F. Boland, “Phase watermarking of digital images”, in IEEE Int. Conf. on Image Processing, 1996.Google Scholar
  16. 16.
    R. D. Preuss, S. E. Roukos, A. W. F. Huggins, H. Gish, M. A. Bergamo, P. M. Peterson, and D. A. G, “Embedded signalling”, US Patent 5,319,735, 1994.Google Scholar
  17. 16a.
    J.P.M.G. Linnartz and A.C.C. Kalker and G.F. Depovere, “Modelling the false-alarm and missed detection rate for electronic watermarks”, Proc. of Second International Information Hiding Workshop, Portland, OR, 1998.Google Scholar
  18. 17.
    T. Kalker, “Watermark estimation through detector observations”, Proc. of the IEEE Benelux Signal Proc. Symp., Leuven, pp 119–122, 1995.Google Scholar
  19. 17a.
    I. J. Cox and J.M.P.G. Linnartz: “Public watermarks and resistance to tampering”, ICIP 97.Google Scholar
  20. 17b.
    M. J. J. Maes, “Twin Peaks: the Histogram Attack to Fixed Depth Image Watermarks”, Proc. of Second International Information Hiding Workshop, Portland, OR, 1998Google Scholar
  21. 17c.
    J.-P. Linnartz and M. van Dijk, “Analysis of the Sensitivity Attack against Electronic Watermarks in Images”, ibid.Google Scholar
  22. 18.
    J. L. Mitchell, W. B. Pennebaker, C. E. Fogg and D. J. LeGall, “MPEG Video Compression Standard”, Chapman and Hall, New York, NY, 1997.Google Scholar
  23. 19.
    Linnartz, J.-P., Kalker, T., Depovere, G.: “Response to Call for Proposals of the Data-Hiding SubGroup of the CPTWG” Sept. 1997.Google Scholar
  24. 20.
    Linnartz, J.-P., Heuvel, S.A.F.A v/d, Smolders, J., unpublished, 1997.Google Scholar
  25. 21.
    MPEG-1 Video Encoder in Software (V1.5), Rowe, L.A et al, Computer Science Division-EECS, UC Berkeley, 1995, Scholar
  26. 22.
    Jordan, F., Kutter, M., Ebrahimi, T.: “Proposal of a Watermarking technique to Hide/Retrieve Copyright Data in Video”, Technical Report M2281, ISO/IEC JTC1/SC29/WG11 MPEG-4 meeting, Stockholm, Sweden, July 1997.Google Scholar
  27. 23.
    J. Lacy, S. R. Quackenbush, A. Reibman and J. H. Snyder, “Intellectual Property Protection Systems and Digital Watermarking”, Proc. of Second International Information Hiding Workshop, Portland, OR, 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • J. P. M. G. Linnartz
    • 1
  • J. C. Talstra
    • 1
  1. 1.Philips ResearchAA EindhovenNetherlands

Personalised recommendations