28 Oct 2024, 7:30 AM
23 Feb 2025, 10:35 PM

2. Digital Watermarking

As introduced in 1. Introduction#Watermarking, digital watermarking is a method of embedding hidden information (often called a stegomessage or watermark) within a host signal, like an image, video, or audio file. We can also say that watermarking is a mechanism to create a communication channel that is multiplexed into original content, making the embedded data part of the media itself.

How Does Digital Watermarking Work?

Digital watermarking takes advantage of what’s known as perceptual headroom, which refers to the limitations of human perception. Our senses—especially sight and hearing—are not perfect, so small changes can be made to digital content without noticeable quality degradation. These small modifications are where the watermark is hidden. The watermark remains undetected by human observers, but specialized signal processing techniques can extract or identify it.

General Process - Theoretical Model 1

The process of embedding a watermark involves an embedding function, which uses an embedding key to insert information into the original data. On the other end, an extraction function retrieves this hidden information using an extraction key. This communication happens over a channel where the host signal serves as the carrier of the embedded message (we need the original data), otherwise we talk about [blind techniques](####Based\ on\ the\ availability\ of\ the\ original\ data).
Here's a diagram to represent the process better:

Theoretical model 1.png|600

Key Requirements

For digital watermarking to be effective, certain requirements need to be met:

Types of Watermarking Attacks

Watermarks can be exposed to various types of attacks:

Watermarking systems must be designed to resist these types of attacks, maintaining both the watermark's integrity and the secrecy of the embedded message.

Watermarking Requirements for Different Applications

Depending on the specific application, different types of watermarks are needed:

Here's a diagram that represents the interrelationship between the above concepts:

Perceptual Transparency
Robustness
Payload
Blind vs. Non-blind
Security

Classification of Watermarking Techniques

Watermarking can be categorized in several ways:

Based on the availability of the original data

Based on the decoding process

Based on the key management

Watermarking in Different Domains

There are two main domains in which watermarking is applied:

Some hybrid techniques combine the benefits of both spatial and transform domains, balancing robustness with spatial localization of the watermark.

Example: LSB Replacement

One simple and widely used watermarking method is Least Significant Bit (LSB) replacement. In this technique, the least significant bits of pixel values are replaced with the watermark’s bits. For instance, if you replace the last few bits of an image's pixels with watermark data, the resulting image will look almost identical to the original, yet the hidden data can be extracted perfectly.

In the example below, the left image is the original, the right one the LSB replaced.

LSB Replacement.png|700

However, this method has its drawbacks. While the watermark can be embedded without noticeable degradation, it's very fragile. Any compression, such as JPEG, or even the addition of minor noise, can destroy the embedded data. This method is also vulnerable to attacks, as the watermark can be removed without affecting the image’s perceptual quality.

Compression? JPEG?

When it is said that the watermark is "fragile," it means that it is highly sensitive to any type of modification to the image. One example is JPEG compression, which is one of the most common techniques used to reduce image file sizes. It works by eliminating certain visual information that is considered less perceivable to the human eye. During this process, the compression can alter the pixel values, and since the watermark is embedded in the least significant bits, it can be overwritten or changed.

Example of Compression: Imagine that the original value of a pixel is 11010101 (where "1" and "0" represent the bits). If a compression process modifies this pixel to 11010100, the watermark could be completely lost.

Robustness Against Attacks

Achieving robustness in watermarking means withstanding common signal processing operations and intentional attacks. Watermarks must be able to survive:

Tools like StirMark and Certimark are commonly used to test the robustness of watermarking systems under various attack scenarios.

Robustness vs. Security

It's important to differentiate between robustness and security in watermarking systems: