Copyright protection in virtual communities through digital watermarking

Si, Huayin and Li, Chang-Tsun 2005, Copyright protection in virtual communities through digital watermarkingEncyclopedia of Virtual Communities and Technologies, IGI Global,, pp.61-65, doi: 10.4018/978-1-59140-563-4.ch012.

Attached Files
Name Description MIMEType Size Downloads

Title Copyright protection in virtual communities through digital watermarking
Author(s) Si, Huayin
Li, Chang-TsunORCID iD for Li, Chang-Tsun
Title of book Encyclopedia of Virtual Communities and Technologies
Publication date 2005
Start page 61
End page 65
Total pages 5
Publisher IGI Global
Summary Although the development of multimedia processing techniques has facilitated the enrichment of information content, and the never-ending expansion of interconnected networks has constructed a solid infrastructure for information exchanges, meanwhile, the infrastructure and techniques have also smoothed the way for copyright piracy in virtual communities. As a result, the demand for intellectual property protection becomes apparent and exigent. In response to this challenge, digital watermarking has been proposed to serve this purpose. The idea of digital watermarking is to embed a small amount of secret information—the watermark—into the host digital productions, such as image and audio, so that it can be extracted later for the purposes of copyright assertion, authentication and content integrity verification, and so forth. Unlike traditional watermarks printed on paper, which are visible to human eyes, digital watermarks are usually invisible and can only be detected with the aid of a specially designed detector. One characteristic distinguishing digital watermarking from cryptography, which separates the digital signature from the raw data/content, is that digital watermarking embeds the signature in the content to be protected. The superiority of this characteristic is that while cryptography provides no protection after the content is decrypted, digital watermarking provides “intimate” protection, because the digital signature/secret information has become an inseparable constituent part of the content itself after embedding. Because of the very characteristic, digital watermarking requires no secret channel for communicating the digital signature that cryptography does. So in the last decade, digital watermarking has attracted numerous attention from researchers and is regarded as a promising technique in the field of information security. Various types of watermarking schemes have been developed for different applications. According to their natures, digital watermarking schemes could be classified into three categories: fragile watermarking, semi-fragile watermarking and robust watermarking. The schemes of the first two categories are developed for the purposes of multimedia authentication and content integrity verification, in which we expect the embedded watermark to be destroyed when attacks are mounted on its host media. More emphases of these schemes are placed on the capability of detecting and localizing forgeries and impersonations. The main difference between the two is that semi-fragile watermarking is tolerant to non-malicious operations, such as lossy compression within a certain compression ratio, while fragile watermarking is intolerant to any manipulations. Robust watermarking, on the other hand, is intended for the applications of copyright protection, wherein the watermarks should survive attacks aiming at weakening or erasing them provided the quality of the attacked content is still worth protecting. Therefore, the emphasis of robust watermarking schemes is placed on their survivability against attacks. This article is intended to focus on robust watermarking schemes for the application of copyright protection. See Li and Yang (2003) and Lin and Chang (2001) for more details about fragile and semi-fragile schemes.
ISBN 9781591405634
Language eng
DOI 10.4018/978-1-59140-563-4.ch012
Indigenous content off
HERDC Research category D2.1 Reference work
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 26 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Thu, 18 Jul 2019, 12:12:53 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact