WO2014127823A1 - Digital verification - Google Patents
Digital verification Download PDFInfo
- Publication number
- WO2014127823A1 WO2014127823A1 PCT/EP2013/053475 EP2013053475W WO2014127823A1 WO 2014127823 A1 WO2014127823 A1 WO 2014127823A1 EP 2013053475 W EP2013053475 W EP 2013053475W WO 2014127823 A1 WO2014127823 A1 WO 2014127823A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- digital content
- watermark
- content
- image
- digital
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32288—Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image
- H04N1/32304—Embedding different sets of additional information
Definitions
- This invention relates to methods and systems for verifying digital content, and more specifically for verifying the integrity and ownership of web-based content.
- the internet provides a vast and changing source of information which is created, edited and accessed by users on a global scale.
- News, opinion, announcements, facts, views and discussions are constantly being published and unpublished as images, video and text on websites, forums, networks, chat rooms, blogs, etc.
- User generated content i.e. content generated and edited by individuals
- content is a widespread and a growing aspect of internet use today.
- Inherently, such content is largely uncontrolled, and consequently the risk of misuse of content in the form of copyright infringement, harassment, privacy issues, or libellous publications amongst others can be an issue.
- traces of its existence are, in most cases, also deleted. It is then very difficult, if not impossible, of establishing that such content was indeed published. In such instances, without evidence of the publication, it may then be difficult to provide recourse for the injured party or prevent further misuse of data.
- Such issues are particularly relevant for content published on sites on which transient or immediate content is published, such as social networks, forums and blogs.
- Watermarking principles are mainly used whenever copyright protection of digital content is required. Some parties who are aware of the existence of the watermark may have an interest removing it. In this framework the most popular and demanding application of watermarking is to give proof of ownership of digital data by embedding copyright statements. For this kind of application the embedded information should be robust against manipulations that may attempt to remove it. Many watermarking schemes show weaknesses in a number of attacks and specifically those causing de-synchronization, which is an efficient tool against most marking techniques. De-synchronization of the detector means that the detector is unable to detect a watermark embedded in an image. Thus detection, rather than embedding, is a core problem of digital watermarking. A weakness of many watermarking detection mechanisms is their inability to counter attacks involving the de-synchronization of the detector due to geometrical attacks. In such cases, the watermarked content has been manipulated to the extent that the detector cannot detect the watermarks embedded in it.
- a digital mark is embedded into the digital content, such that the content is then 'watermarked'.
- the watermark itself is imperceptible under normal viewing of the content, and is only detected under certain conditions, and by querying the content using particular algorithms.
- Such watermarks may be 'robust' or 'weak'. If it can be verified that a watermark was embedded in the content, but is not detected, it might be concluded that the content has been altered or tampered to the extent that the watermark has been removed. Thus integrity of the digital content cannot be verified.
- a detected watermark may indicate that the digital content is owned by a particular party.
- the applicability and effectiveness of known techniques for rapidly changing internet content for preserving such content, in the event of any disputes involving the watermarked content, ensuring that the evaluation of the watermarked content is impartial and not biased to any particular party.
- an aspect of the invention provides a method of watermarking digital content by a trusted third party, comprising: capturing an image of the digital content; embedding a first watermark into the digital content, wherein the presence of the first watermark indicates the owner of the digital content; embedding a second watermark into the digital content, wherein the presence of the second watermark indicates integrity of the digital content.
- a second aspect of the invention provides a system according to appended claim 9.
- a third aspect of the invention provides a system according to appended claim 12.
- the present invention provides an on-demand mechanism by which content is watermarked and stored by an entity acting as a trusted, secure and impartial authority to enable the verification that digital content published on a website included specific content at a specific, defined time, to protect and verify the existence and publication of such content, as well as authenticate its authorship.
- the present invention provides an on-demand mechanism of providing watermarked content to requesting parties, and for detecting and reading the watermark(s) so as to verify ownership and/or integrity of the data.
- Figure 1 shows components of the overall system architecture for and method of applying watermarking digital content according to an aspect of the invention
- Figure 2 shows steps of a method of providing watermarked content according to an embodiment of the invention
- Figure 3 shows steps of a method of watermarking content according to an embodiment
- Figure 4 shows steps of a method of detecting a digital security mark according to an aspect of the invention
- Figure 5 is a table illustrating the change in quality of the signal due to watermarking
- Figure 6 is a table illustrating the degree of success against attacks due to the watermarking techniques of the present invention
- Figure 7 is a table illustrating detection results due to digital to analogue attacks
- Figure 8 shows a graph depicting the relative strength of a watermark against attacks according to an embodiment.
- System 100 comprises capturing module 106, watermarking module 112, digital archive 110 and digital library 108.
- System 100 is operated and maintained by trusted third party that is financially, commercially and legally distinct from the requesting party.
- the trusted third party is an independent and impartial registration and verification authority, and therefore has no bias towards any other party. This is advantageous since the integrity of the capturing and watermarking embedding process, as well as the detection and verification process can be assured - the trusted third party has no connection with any other party or entity involved in the process.
- the trusted third party is typically a university or other independent institution.
- An application form from a requesting party is received by the system 100.
- the online capturing module 106 takes a 'snap shot' of the requested webpage from internet 101.
- a still image of the complete content of the webpage is then created .
- an administrator of the system is notified, upon receipt of the application form, and prompted to capture the website. However, in other embodiments this step may be automated.
- a copy of the original, non- watermarked image is stored, in Digital Archive 110, along with information extracted from the application form.
- Watermarks are embedded into the image in watermarking module 112.
- the watermarked image of the captured webpage, along with metadata, is stored in digital library 108.
- the process steps are described with reference to Figure 2.
- the application form is a web- based form which may be accessed by any internet user.
- the application form is used by any party to request the watermarking of content on a particular website.
- the application is submitted to the system 100 using a internet portal but may also be sent via email, for example, or via other digital means.
- the information received by system 100 from application form includes names, contact addresses and the address of the website to which digital watermarking techniques are to be applied.
- the content to be captured, watermarked and stored is provided by the requesting party directly.
- the requesting party instead of or in addition to requesting a webpage to be captured, provides content directly to the trusted third party operating system 100 in the form of a digital document.
- the online capturing module 106 validates the IP address of the requested web address so as to verify the original source of the web page and trace the route of the web page. Information about this route is stored (as will be described below) to avoid possible forgery of the web address in the future.
- Online capturing module 106 applies an algorithm which parses the source code of the web page so as to integrate the whole web page, regardless its length, width and included items (text, images, banners etc) into a single still image (step 206).
- the algorithm can be used with the various and differing technologies and programming languages used to construct and support a web page, as well as engines used by known internet browsers to present a web page to the final user.
- the still image of the webpage is of a standard format (e.g. jpeg).
- an original, full size and original quality image of the captured webpage is stored (i.e. prior to watermarking) in archive 110.
- Metadata is directly assigned (202) to the specific snapshot and includes the web address of the captured website, a timestamp, the applicant's name and surname (where applicable), the requesting party's email address, telephone number, fax number, a description of the webpage and any comments provided by the applicant in relation to request and details of the administrator or personnel involved in the capturing of the webpage.
- the image is accompanied by technical and descriptive metadata based on international metadata standards.
- the metadata is also stored with the original image in the archive.
- the first watermark is a robust and invisible watermark since it is embedded using an identification number which is unique at a global level (it is based on a DOI (Digital Object Identifier) schema to ensure its uniqueness). Extraction of this watermark is only possible using the unique identification number and so it can be verified, by extracting the watermark, that the digital image is owned by the administrator of the digital library, i.e. the trusted third party and that is has been stored in the trusted third party's library. In the case of a dispute, where two parties claim ownership of the content, only the true owner will have access to the DOI number (via the trusted third party, using the securely stored metadata). If this DOI number is provided to the detector and the first watermark is extracted, that party will be shown to be the true owner of the content.
- DOI Digital Object Identifier
- the second watermark is weak and invisible and is used to provide verification of the integrity of the image and control copying of the image.
- This watermark is embedded into the content using a constant, well known number. Extraction of this watermark can therefore be achieved fairly easy using the constant, well known number acting as a 'key'.
- this second watermark acts as a "never copy" instruction.
- Compliant devices are equipped with the detector of the watermarking mechanism and have knowledge of the constant key. If the detector of the compliant device detects the watermark it verifies the "never copy" instruction and forbids the replication of the content. If this watermark is not detected (or has changed), it can be concluded that the content has been altered and its authenticity can therefore not be verified.
- Transaction tracking is also facilitated by the use of a weak watermark.
- This type of watermark is typically embedded into the content at each stage of its distribution.
- the second watermark is extracted using a well known key, and, the extracted watermark (where the detector outputs a numerical value, rather than a Boolean response) therefore indicates the distribution source (i.e. the point from which the content went to the wrong hands)
- the snapshot is stored in the system 100 (and therefore owned by a party known to the trusted third party) and that the image has not in any way been altered, processed or manipulated (e.g. that colors, texts, images have not been changed and that cropping, rotation, resize or any other type of processing has not occurred).
- the watermarked image is stored in the digital library at step 216.
- the images in addition to storage in a secure database, are also stored on optical and magnetic storage media.
- the snapshots are stored based on standard formats. Lossless data types are typically used (e.g. .tiff).
- a backup routine produces full content surrogates each week and ensures zero data loss in case of hardware and software failure.
- the optical media e.g. DVDs
- the optical media which store images are renewed every 2 years so as not to lose data due to deterioration.
- the images are migrated to new storage media in the case that the maximum lifespan of the old storage media has been reached based on the manufactures estimation, or discovery of read errors during storage media tests.
- Quality checks bits/bytes comparison, checksum evaluation
- read-only copy of the watermarked image is sent to the requesting party.
- the API Application Protocol Interface
- the API which supports the watermarking module 1 12 supports both embedding and detection of watermarks. Consequently, system 100 thus provides a watermarking mechanism which provides both the watermarking of content and the detection of the watermarks in the case of a dispute between two or more parties claiming ownership of content, for example.
- the API is structured as a independent dynamic link library which is universally applicable by just referencing the corresponding class.
- a unique number is generated (302) is used to embed the first watermark into the image (304). This number is required in order for the detector to detect the watermark in the digital content (i.e. the snapshot of the website).
- the unique number used to embed the first watermark is generated by watermarking module 112 and then provided, via secure means, to one of a limited number of known personnel.
- the unique number key, and the individual to which it has been provided, is stored.
- the administrator checks that the unique number key provided to the individual matches the unique number key the individual has submitted to the administrator, along with the watermarked content. In this way, unauthorized or unknown individuals are prevented from populating the digital library with potentially malicious data.
- supplementary information relating to the original, non- marked digital content is stored in the library using the DOI number (i.e. the key for the first watermark). This information is also retrieved using the DOI number, thereby linking it to the watermarked digital content.
- Such supplementary information typically includes the format of the image, aspect ratio, average colour and histogram.
- a watermark detection process is described with reference to Figure 4.
- a comparison between the original content and watermarked content which has been manipulated provides a countermeasure against de-synchronization attacks as mentioned above.
- Image registration enables the original copy of the image to be located. If the original copy of the image is found, the detector is more likely to achieve synchronization and detect the watermark.
- the necessary information required to achieve synchronization is, in many cases, the original content. However, as discussed below, supplementary information may also be used to do this.
- the detection process is initiated at step 402.
- the DOI number key is fed into the detector, and a detection algorithm is executed in relation to the watermarked content.
- the detector may detect the presence of a watermark in the watermarked image (412). If the detector does not detect the watermark (in the case that the watermarked content has been manipulated and therefore the detector is desynchronized), the original, non- watermarked content is retrieved from the digital archive.
- a QBIC query by image content
- a search is then conducted of the digital archive at step 406. If the original watermarked copy cannot be found, the possibility remains that the watermark is not detected (step 414).
- the original watermarked copy is found, it is 'registered' in the archive by assigning to it the first identification number. This allows the image to be located in future in the library.
- the detector compares the original content with the watermarked content and typically derives supplementary information so as to perform any estimates or adjustments that are necessary to achieve synchronization. The detection process is re-applied at step 410 and the watermark is found at step 412.
- a supplementary information database can be queried to retrieve the supplementary information extracted for the original content. By comparison of the supplementary information and the watermarked content, any alterations to the content can be identified.
- the supplementary information database is queried instead of finding the original content to save time, since it typically takes longer to derive the supplementary information from the original content that to pre process the content and find the supplementary information which has already been stored.
- the supplementary information associated with the image by the DOI number enhances the robustness of the watermark since it provides a defense against geometrical attacks during the detection process which may result in the failure of the detector to detect the 'robust' watermark.
- the supplementary information helps to synchronize the detector and detect the watermark. For example, in the case of an image that has been distorted, the key used to embed the watermark is fed into the detector. If the watermark is not detected, the reason for this may be that the detector is desynchronized due to the distortion. In this case, the supplementary information is retrieved, using the first identification number, in order to determine the extent to which the distortion occurred. Knowledge of the original image enables the detection algorithm to compensate for a changes to the watermarked images caused by manipulation of the watermarked image.
- the value returned by the detector indicates the watermark's existence (a Yes or No Boolean response).
- the detector may return an integer value, which can indicate information regarding the digital object.
- Figure 5 shows the peak signal to noise ratio, which provides a measure of the extent of change of quality introduced due to the embedding of watermarks.
- the results of various geometrical attacks are provided in Figure 6, where the average score indicates the degree of success against the attacks.
- Figure 7 details the detector outputs of digital to analog attack, where small numbers of images which were compressed with a jpeg algorithm were printed to plain paper and were then scanned back to digital form.
- the watermarking technique of the present invention requires consideration of the data payload embedded into the content and the detector's ability to detect multiple watermarks.
- Data payload refers to the number of bits a watermark encodes within a unit of time or within a digital object.
- a disadvantage of embedding a substantial number of bits into the content is the extent of distortion to the original content.
- three zero-bit watermarks where the detector's output is either one or zero
- multiple watermarks refers to the detector's potential of detecting and distinguishing portions of different watermarks embedded into a single piece of content without confusion.
- the algorithm which generates the watermarks by allowing the detector to resolve the signal either above or below a determined threshold.
- the detector used in the proposed DRM system reveals the existence of 11 watermarks. Three of them correspond to the three zero-bit schemes while the remaining eight responses are used for the encoding of the fingerprint.
- the present invention in addition to being able to verify ownership of content or a time at which content is published, or that content has not been tampered, for example, a person who is the target or victim or harassment or abuse on a social networking site is able to request that the webpage containing such offensive material is captured by the techniques of the present invention. Based on the verification techniques disclosed herein, the actual publication of such content can be verified (long after, for example, the particular page has been edited and the offensive content no longer publicly accessible or viewable). Whilst the invention has been described with reference to a still image derived from webpage content, the techniques described could also be used to watermark video, sound and other moving images or animations.
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1516703.4A GB2527227A (en) | 2013-02-21 | 2013-02-21 | Digital verification |
PCT/EP2013/053475 WO2014127823A1 (en) | 2013-02-21 | 2013-02-21 | Digital verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2013/053475 WO2014127823A1 (en) | 2013-02-21 | 2013-02-21 | Digital verification |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014127823A1 true WO2014127823A1 (en) | 2014-08-28 |
Family
ID=47884247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2013/053475 WO2014127823A1 (en) | 2013-02-21 | 2013-02-21 | Digital verification |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2527227A (en) |
WO (1) | WO2014127823A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11275867B1 (en) * | 2018-02-28 | 2022-03-15 | Amazon Technologies, Inc. | Content integrity processing |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6272634B1 (en) * | 1996-08-30 | 2001-08-07 | Regents Of The University Of Minnesota | Digital watermarking to resolve multiple claims of ownership |
US20040101160A1 (en) * | 2002-11-08 | 2004-05-27 | Sanyo Electric Co., Ltd. | Multilayered digital watermarking system |
US6804779B1 (en) * | 2000-01-10 | 2004-10-12 | Sun Microsystems, Inc. | Hierarchical watermarking of content that is distributed via a network |
JP2008171220A (en) * | 2007-01-12 | 2008-07-24 | Ntt Comware Corp | Web page authenticity checking device, web page authenticity checking method, and program therefor |
-
2013
- 2013-02-21 GB GB1516703.4A patent/GB2527227A/en active Pending
- 2013-02-21 WO PCT/EP2013/053475 patent/WO2014127823A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6272634B1 (en) * | 1996-08-30 | 2001-08-07 | Regents Of The University Of Minnesota | Digital watermarking to resolve multiple claims of ownership |
US6804779B1 (en) * | 2000-01-10 | 2004-10-12 | Sun Microsystems, Inc. | Hierarchical watermarking of content that is distributed via a network |
US20040101160A1 (en) * | 2002-11-08 | 2004-05-27 | Sanyo Electric Co., Ltd. | Multilayered digital watermarking system |
JP2008171220A (en) * | 2007-01-12 | 2008-07-24 | Ntt Comware Corp | Web page authenticity checking device, web page authenticity checking method, and program therefor |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11275867B1 (en) * | 2018-02-28 | 2022-03-15 | Amazon Technologies, Inc. | Content integrity processing |
Also Published As
Publication number | Publication date |
---|---|
GB2527227A (en) | 2015-12-16 |
GB201516703D0 (en) | 2015-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8977860B2 (en) | Method and apparatus for tamper proof camera logs | |
Rey et al. | A survey of watermarking algorithms for image authentication | |
EP3673393B1 (en) | Identifying copyrighted material using embedded copyright information | |
US11288345B2 (en) | Identifying copyrighted material using embedded timestamped copyright information | |
EP3907634B1 (en) | Copyright protection based on hidden copright information | |
US8442997B2 (en) | Method and apparatus for monitoring the distribution of electronic files | |
US20190005268A1 (en) | Universal original document validation platform | |
US8175322B2 (en) | Method of digital watermark and the corresponding device, and digital camera which can append watermark | |
EP3673392B1 (en) | Copyright protection based on hidden copyright information | |
US20050172130A1 (en) | Watermarking a digital object with a digital signature | |
US11227351B2 (en) | Identifying copyrighted material using embedded copyright information | |
EP3673453B1 (en) | Identifying copyrighted material using copyright information embedded in tables | |
KR20010097834A (en) | Realtime digital watermarking system and operating method in encrypt | |
Guru et al. | Digital watermarking classification: a survey | |
CN109461110B (en) | Method and device for determining traceability information of picture | |
US8032755B2 (en) | Request linked digital watermarking | |
WO2014127823A1 (en) | Digital verification | |
JP2000156781A (en) | Digital watermark imbedding device, illegality detector and computer-readable storage medium | |
Maji et al. | Image tampering issues in social media with proper detection | |
JP5408113B2 (en) | Electronic image data verification program, electronic image data verification method, and electronic image data verification apparatus | |
JP2002158865A (en) | Method and system for processing image information | |
Sharma et al. | Digital watermarking for secure e-government framework | |
Alghamdi et al. | A novel database watermarking technique using blockchain as trusted third party | |
Avila-Domenech et al. | Dual watermarking for handwritten document image authentication and copyright protection for JPEG compression attacks | |
Puhan et al. | Secure authentication watermarking for localization against the Holliman–Memon attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13709336 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 1516703 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20130221 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1516703.4 Country of ref document: GB |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 30/11/2015) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13709336 Country of ref document: EP Kind code of ref document: A1 |