Traitor Tracing After Visible Watermark Removal

Watermarks are often used to protect copyright-protected videos from illegal re-distribution. More specifically, a unique watermark that represents the receiver’s identifier is embedded into the video. In this way, malicious users can be identified when they leak their received version of the video. However, when the watermark is embedded as visible text in the video, it is easy for digital pirates to delete it such that they can no longer be identified. Therefore, copyright owners will benefit from a technique that allows the detection of a visible watermark when it is removed. This paper demonstrates how a visible watermark indirectly generates imperceptible variations over the entire video. As such, these variations in the non-watermarked area can be used as an alternative watermark representation, and thus enable watermark detection even after watermark removal. The experimental results prove that the watermark can be detected as long as the quality of the watermarked video is not significantly reduced, especially if the originally-distributed watermarked video has a high quality. Moreover, the watermark should be embedded into a video with sufficient motion. In conclusion, the proposed technique enables copyright-owners to identify pirates when they illegally distribute visibly-watermarked videos, even when the watermarked area is removed.

[1]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[2]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[3]  Mark R. Pickering,et al.  An Overview of Digital Video Watermarking , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Peter Lambert,et al.  A Novel Video Watermarking Approach Based on Implicit Distortions , 2018, IEEE Transactions on Consumer Electronics.

[5]  KokSheik Wong,et al.  An Overview of Information Hiding in H.264/AVC Compressed Video , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  F. Bossen,et al.  Common test conditions and software reference configurations , 2010 .

[7]  Gary J. Sullivan,et al.  Overview of the High Efficiency Video Coding (HEVC) Standard , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[9]  Mohan S. Kankanhalli,et al.  A dual watermarking technique for images , 1999, MULTIMEDIA '99.

[10]  Jian Weng,et al.  Improved Algorithms for Robust Histogram Shape-Based Image Watermarking , 2017, IWDW.

[11]  Mohan S. Kankanhalli,et al.  Adaptive visible watermarking of images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[12]  Ja-Ling Wu,et al.  Attacking visible watermarking schemes , 2004, IEEE Transactions on Multimedia.

[13]  Z. Jane Wang,et al.  Correlation-and-bit-aware multiplicative spread spectrum embedding for data hiding , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[14]  Yongjian Hu,et al.  Using invisible watermarks to protect visibly watermarked images , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[15]  Xiaolong Li,et al.  Improved Reversible Visible Watermarking Based on Adaptive Block Partition , 2017, IWDW.

[16]  Ja-Ling Wu,et al.  Inpainting attacks against visible watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.