Watermarking of digital geospatial datasets: a review of technical, legal and copyright issues

It has been widely recognized that gathering data accounts for more than 80 per cent of the cost of any GIS project. Software and hardware costs are decreasing, but not datasets. In the analog era, unauthorized copy of the datasets was difficult to made, requiring not only access to them but also specialized equipment and procedures. Fast Internet connections and digital datasets threaten the data producer investments through piracy, which today is easier than ever. Software providers have solved the piracy problem for their product supplying hardware keys, or through runtime license services. However, they do not offer similar protection to the dataset being used by their software. Reasons are both technical and legal. Outside the GIS community this problem has been known for a long time; we will consider current, possible solutions for digital imagery, formatted text, 3D meshes and so on, showing possible links to typical Geospatial datasets. The current proposed solution forces the data producer to rely in weaker protection means: the dataset delivered to customers is functionally valid, but some subtle changes identify uniquely the buyer, the supplier as well as other extra information. The process for embedding hidden information in a dataset without producing perceptible changes is denoted as watermarking. The producer can recover the embedded information on request in order to produce evidence of ownership in a court, so the overall strategy relies on legal basis rather than technical ones. The differences with cryptography will be made clear. This paper analyzes the state-of-the-art for watermarking protection in digital geographic datasets, with emphasis to the technical aspects. We analyzed the situation of some typical formats: raster images, vector and point datasets, as well as text and databases. Some reference to the legal status of copyright digital geographic data in the US and the EU is also presented. The review makes evident that digital imagery has clearly a maturer situation, even with multiple commercial vendors offering watermarking protection. 2D vector and point datasets have received less attention from the research community; however, 3D meshes have been considered by the CAD community and a handful of techniques are available for that case, and they are reviewed here. Some references are provided for the case of text and databases.

[1]  Frank Bossen,et al.  Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.

[2]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[3]  Adam Finkelstein,et al.  Robust mesh watermarking , 1999, SIGGRAPH.

[4]  Oliver Benedens,et al.  Geometry-Based Watermarking of 3D Models , 1999, IEEE Computer Graphics and Applications.

[5]  Jack C. Lee,et al.  Toward on-line, worldwide access to Vatican Library materials , 1996, IBM J. Res. Dev..

[6]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[7]  Jian Zhao,et al.  In business today and tomorrow , 1998, CACM.

[8]  Boon-Lock Yeo,et al.  Watermarking 3D Objects for Verification , 1999, IEEE Computer Graphics and Applications.

[9]  Hiroaki Date,et al.  DIGITAL WATERMARKING FOR 3 D POLYGONAL MODEL BASED ON WAVELET TRANSFORM , .

[10]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[11]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[12]  Mahalingam Ramkumar Data hiding in multimedia - theory and applications , 1999 .

[13]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[14]  M. Garland,et al.  Multiresolution Modeling: Survey & Future Opportunities , 1999 .

[15]  C.-C. Jay Kuo,et al.  Blind digital watermarking for cartoon and map images , 1999, Electronic Imaging.

[16]  Ioannis Pitas,et al.  Protecting Digital-Image Copyrights: A Framework , 1999, IEEE Computer Graphics and Applications.

[17]  Steven H. Low,et al.  Document identification for copyright protection using centroid detection , 1998, IEEE Trans. Commun..

[18]  Wenjun Zeng,et al.  A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..

[19]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[20]  Steven H. Low,et al.  Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..

[21]  Christophe De Vleeschouwer,et al.  Watermarking algorithm based on a human visual model , 1998, Signal Process..

[22]  Kannan Ramchandran,et al.  Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[23]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[24]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[25]  Nasir D. Memon,et al.  Protocols for Watermark Verification , 2001, IEEE Multim..

[26]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[27]  Hiroshi Masuda,et al.  Watermarking three-dimensional polygonal models through geometric and topological modifications , 1998, IEEE J. Sel. Areas Commun..

[28]  Ioannis Pitas,et al.  Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[29]  Lawrence O'Gorman,et al.  The Document Spectrum for Page Layout Analysis , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[30]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..