[Download postscript version]
next up previous
Next: ``Real World'' concerns Up: Digital Image Watermarking in Previous: Digital Image Watermarking in

Introduction

  Since the use of the Internet has become widespread, the term ``slippery age'' has been used to express the short life span of data, the anonymity of users, the ease of fraud, etc. Namely the protection of intellectual property has become a major problem in the digital age. The ease of copying digital information without any loss of quality violates the conservation of mass property of traditional media, which inhibited wide global distribution. On the Internet today it is possible to duplicate digital information a million-fold and distribute it over the entire world in seconds. These issues worry creators of intellectual property to the point that they even consider not publishing on the Internet at all.

To solve the problem of publishing digital images, researchers have come up with digital image watermarking. This method allows the owner of an original image to add an invisible watermark to the digital image before publishing it. The watermark serves to claim copyright on the image. The owner protects the watermark with a cryptographic secret key, inhibiting anybody that does not possess the secret key from reading or even detecting the watermark. The watermark is also supposed to be robust against image tampering. Therefore anybody who wants to distribute the image further will also distribute the watermark with it, violating the copyright on the image. If the copyright holder can detect the fraud, he can prove ownership by showing that the image contains his proper private watermark.

The scheme described works well in a ``perfect'', clean-room research environment. But in the ``real world'' people play by different rules. The systems are not used as intended in the research environment and hidden back-doors are exploited. This report shows the problems that today's current digital image watermarking schemes face.

For the rest of this paper we will use the characters Alice, Bob and Mallory [Sch96] to describe copyright protection scenarios. Alice in our case is the image creator and copyright holder and Bob is the Buyer of the image. In some other settings Alice and Bob always represent the righteous characters. Mallory on the other hand is the malicious attacker and tries to forge, steal, etc.

The convention for describing the watermarking procedure is that Alice inserts a watermark into the original image. To check the image for a watermark, she can extract it.


next up previous
Next: ``Real World'' concerns Up: Digital Image Watermarking in Previous: Digital Image Watermarking in
Adrian Perrig
1/15/1998