Secure Client-Side St-Dm Watermark Embedding

Client-side watermark embedding systems have been proposed as a possible solution for the copyright protection in large-scale content distribution environments. In this framework, we propose a new look-up-table-based secure client-side embedding scheme properly designed for the spread transform dither modulation watermarking method. A theoretical analysis of the detector performance under the most known attack models is presented and the agreement between theoretical and experimental results verified through several simulations.

The experimental results also prove that the advantages of the informed embedding technique in comparison to the spread-spectrum watermarking approach, which are well known in the classical embedding schemes, are preserved in the client-side scenario. The proposed approach permits us to successfully combine the security of client-side embedding with the robustness of informed embedding methods.

Existing System:

Proving ownerships rights on outsourced relational database is a crucial issue in today's internet based application environments and in many content distribution applications. Watermarking in least significant bits technique embeds the watermark bits in the least significant bits of selected attributes of a selected subset of tuple’s. It uses secret key in watermarking. For each tuple’s a secure message, authenticated code is computed using the secret key and tuple’s primary key. The computed MAC is used select candidate tuple’s attributes and the least significant bits positions in the selected attributes.

Proposed System:

Client-side watermark embedding systems have been proposed as a possible solution for the copyright protection in large-scale content distribution environments. In this framework, we propose a new look-up-table-based secure client-side embedding scheme properly designed for the spread transform dither modulation watermarking method.

Watermarking embeds ownership information in digital content. Watermark describes information that can be used to prove the ownership of relational database. Here the embedding is hidden that the presence of watermarking is invisible to the user. the ST-DM watermarking scheme and the LUT-based secure embedding approach. In Table I a list of the main symbols used hereafter is provided.

The proposed approach permits us to successfully combine the secure embedding of client side with the superior robustness of informed embedding techniques, providing a new powerful tool for the secure distribution of high-quality multimedia contents. Open issues in the proposed framework to be addressed in the future research concern the need of higher security and the compression overhead.

The proposed client-side ST-DM embedding has been compared with a previously proposed client-side SS watermarking system, showing that the advantages of the informed embedding technique, which are well known in traditional watermarking systems, are preserved in the client-side scenario. This is not an obvious result, since the client-side framework imposes some constraints that do not allow us to embed a pure ST-DM watermark.

Modules:

  • Networking module

  • Client-side embedding
  • St-dm watermark