Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications

Copyright [©] (1998) by IEEE. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distrubuted for profit. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee.

Digital watermarks have been proposed in recent literature as a means for copyright protection of multimedia data. In this paper we address the capability of invisible watermarking schemes to resolve copyright ownerships. We show that, in certain applications, rightful ownerships cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownerships. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image.
In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose non-invertible watermarking schemes, and subsequently give examples of techniques that we believe to be non-quasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully re-evaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and re-think the promises, applications and implications of such digital means of copyright protection.

By: Scott Craver (N. Illinois Univ.), Nasir Memon (N. Illinois Unvi.), Boon-Lock Yeo and Minerva Yeung

Published in: IEEE Journal On Selected Areas In Communications, volume 16, (no 4), pages 573-86 in 1998

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .