Innovative technique to curtail illegal copying of digital media

Innovative technique to curtail illegal copying of digital media
A new optical watermarking system uses single-shot ptychography encoding to create the watermark (Part 1) that is then embedded into a host image (Part 2). Credit: Yishi Shi, University of Chinese Academy of Sciences

In today's digital world it can be challenging to prevent photos, videos and books from being illegally copied and distributed. A new light-based technique is making it more practical to create secure, invisible watermarks that can be used to detect and prosecute counterfeiting.

"In our research, we use a complex pattern of light, or diffraction pattern, as a unique watermark," said Yishi Shi, from the University of Chinese Academy of Sciences, China. "The invisible watermark is embedded into the content we are trying to protect. Imperceptibility is one of the most significant advantages of optical watermarking."

In The Optical Society's journal Optics Express, Shi and colleagues report a new approach that encodes the optical watermark in a single step. The new technique is faster and uses a less complex optical setup than other optical watermarking approaches previously pursued. The new technique can also be used to optically encrypt data or to hide information within images.

Practical watermarking

The new method is based on a technique called single-shot ptychography encoding (SPE) that uses multiple partially-overlapping beams of light to generate a diffraction pattern from a complex object. Unlike other methods, SPE can encode the optical watermark in a single exposure with no mechanical scanning. SPE is also less prone to error than other methods and uses a simpler optical setup.

In addition to conducting numerical simulations to test their method, the researchers carried out an optical experiment showing the usefulness of SPE. "Most methods for optical watermarking have only been demonstrated with simulations," said Shi. "Our experiment shows that our method is suitable for practical optical watermarking."

For the optical experiment, the researchers used SPE to create a complex watermark consisting of a diffraction pattern of multiple tiny spots. Prior to embedding the watermark into a host image, they used computer processing to remove any repeated data and to scramble the , making it easier to embed the watermark and further improving its security. The spot size can be reduced to smaller than 10 microns, which helps prevent degradation of the host image.

Once a watermark is embedded into digital media, there are multiple ways to detect it to check for authenticity. If someone knows an optical watermark is present, it can be detected by subtracting the host image from the watermarked image and then using a special security key and extraction algorithm. For cases where the presence of a watermark is unknown, the watermark could be extracted using existing algorithm-based detection methods.

Upping the complexity

The researchers are now working to apply SPE to dynamic watermarking, which creates watermarks from objects that change quickly. For example, the variations that occur within a biological cell could be recorded and used to create a special watermark. They also plan to use SPE for multi-image watermarking and even 3D watermarking, while also working to further enhance the imaging quality of single-shot ptychography.


Explore further

Sudoku saves photographers from copyright theft

More information: WenHui Xu, HongFeng Xu, Yong Luo, Tuo Li, and Yishi Shi, "Optical watermarking based on single-shot-ptychography encoding," Opt. Express 24, 27922-27936 (2016). DOI: 10.1364/OE.24.027922
Journal information: Optics Express

Citation: Innovative technique to curtail illegal copying of digital media (2016, November 22) retrieved 20 October 2019 from https://phys.org/news/2016-11-technique-curtail-illegal-digital-media.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
688 shares

Feedback to editors

User comments

Nov 22, 2016
Water Marking digital material was suggested by German scientists for CD's, DVD's etc over 10 - 15 years ago. Today someone else is suggesting the same thing and it's called "an innovative technique". Hmmm, seems most of us (namely reporters) have a short memory or don't fact check what you're reporting on.

Nov 22, 2016
What if the pirate applies a randomised, equally subtle, change of colour to each pixel?

Nov 22, 2016
All this is moot to those who download pirated content via a bit-torrent engine. The objective is to view the content, and this process in no way disables that objective.

Nov 22, 2016
What happens if you use a basic graphics program to auto-adjust and/or sharpen the image ?

Worse, what happens if you re-size / re-sample then save as a JPEG with a *different* compression ??

When I re-work product images to serve as 'folder' icons, I'm often surprised by disproportionate reductions in file-size. Must wonder if due to steganographic bit-tweaking...

Nov 22, 2016
When I re-work product images to serve as 'folder' icons, I'm often surprised by disproportionate reductions in file-size. Must wonder if due to steganographic bit-tweaking...


What happens if you compress the watermarked image (W) with JPEG creating J and and then produce W xor J? (call this X) Do it a few times with different images and the same watermark, and then add the various Xs together and divide by the number of images (call this A). Now create W xor A and you have an unwatermarked image U that is much closer to the original than the JPEG.

For a useful watermark algorithm, you need to fold a part of the image that is not affected by the watermark into the watermark itself. For example, JPEG compress the image minus its least significant bit (LSB) of each pixel xored with the watermark and secure hashed into the new LSBs. It could still be shaved off and replaced by a new watermark, but then we get into the philosophy that data wants to be free.

Nov 22, 2016
Burn the DMCA!

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more