SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Digital
watermarking
By:-jaykrishna Thakkar
Fy Msc-it
wHat iS a watermark..?
 Watermarking is an important
mechanism applied to physical objects
like bills, papers, garment labels ,product
packing…
 Physical objects can be watermarked
using special dyes and inks or during
paper
manufacturing.
CHaraCteriStiCS of
watermarkS
 The watermark is hidden from view
during normal use, only become visible
by adopting a special viewing process.
– E.g. hold the bill up to light
 The watermark carries information
about the object in which it is hidden.
– E.g. the authenticity of the bill
– E.g. the trademark of the paper
manufacturer
HiStory of watermarking
 The term “watermark” was probably
originated from the German term
“wassermarke”. Since watermark is of
no importance in the creation of the
mark, the name is probably given
because the marks resemble the effects
of water on paper.
 Papers are invented in China over a
thousand years ago. However, the first
paper watermark did not appear until
1282, in Italy.
HiStory of watermarking
 By the 18th century, watermarks on
paper in Europe and America had been
used as trademarks, to record the
manufactured date, or to indicate the
size of original sheets.
 Watermarks are commonly used on bills
nowadays to avoid counterfeiting
wHat iS Digital watermarking?
 Watermarking can also be applied
to digital signals!
image video Audio
HiStory of Digital watermarking
 The first watermarking example similar to the
digital methods nowadays appeared in 1954.
The Muzak Corporation filed a patent for
“watermarking” musical Work. An identification
Work was inserted in music by intermittently
applying a narrow notch filter centred at 1KHz.
 About 1995, interest in digital watermarking
began to mushroom.
Definitions about Digital
watermarking
 Digital watermarking:
– The practice of imperceptibly alternating a
Work to embed a message about the Work.
 – Related terms
 Work: a specific copy of some electronic signal,
such as a song, a video sequence, or a picture
 Cover Work: the original un-watermarked work,
since it covers (hides) the watermark
 Watermark: the messages being embedded,
indicating some information about the work
How it works…
types of watermark
 Visible
 A visible translucent
image which is overlaid
on the primary image
 Invisible
 An overlaid image
which cannot be seen,
but which can be
detected
algorithmically
Visible watermark
 Logo or seal of the organization which
holds the rights to the primary image,
it allows the primary image to be
viewed, but still marks it clearly as the
property of the owning organization.
 Overlay the watermark in a way which
makes it difficult to remove, if the goal
of indicating property rights is to be
achieved.
Visible watermark
inVisible watermark
 Embedding level is too small to notice
 Can be retrieved by extraction software
 Applications:
Authentication
Copyrighting
Etc…
inVisible watermark
ApplicAtions of digitAl
wAtermArking
 Rights management
 Contents management
 Access/copy control
 Authentication
feAtures of wAtermArking
 Invisible/Inaudible
 Information is embedded without digital content
degradation, because of the level of embedding
operation is too small for human to notice the
change.
 Inseparable
 The embedded information can survive after some
processing, compression and format transformation.
 Unchanging data file size
 Data size of the media is not changed before and
after embedding operation because information is
embedded directly into the media.
technicAl requirements for
wAtermArking
Invisibility
Robustness Capacity
digitAl wAtermArking AlliAnce
Represents applications and solutions for:
 Audio and Music Content
 Video, Movies and TV Content
 Digital Imagery
 Identity Documents
 Value Documents
digitAl wAtermArking AlliAnce
members
digitAl wAtermArking exAmples
 Copyright Communication
 Copy Protection
 Monitoring
 Filtering/Classification
 Authentication/Integrity
 Product Serialization & Tracking
 Asset/Content Management
 Rights Management
 Remote Triggering
 Linking/E-Commerce
copyright digitAl
wAtermArk Architecture
Audio/Video Master
Embed Copyright
and Content ID DWM
Content Owner
Provider Index Database Location
(Centralized or Distributed)
User’s PC
Rip Software
Compressed Audio/Video
File (e.g. MP3 file)
User Software
Detect Copyright and Content ID
DWM for Secure and Enhanced
content
Rights & Info Database
Content ID linked to rights, information
and related content
Can be used to address P2P and social network content Identification needs as well
as providing identification of orphan works and access to metadata/networked
information
Digital MeDia Serialization &
tracking
 Identifies content owners and rights
while communicating copyright
information
 Awareness of watermarked content by
consumer creates deterrent against
unauthorized copying and distribution
 Provides accurate identification of source
of unauthorized content discovered on
the Internet and/or physical media
Protected for
privacy
Recordable Media
Embed
Serial # (2)
Embed
Serial # (1)
Content ID
Retail Content
Content Provider
Track and take
proper action Detect
Serial Number
any queStionS…
Digital watermarking

Weitere ähnliche Inhalte

Was ist angesagt?

digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Bharath
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
divya sri
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 

Was ist angesagt? (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Watermark
WatermarkWatermark
Watermark
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Introduction of database watermarking
Introduction of database watermarkingIntroduction of database watermarking
Introduction of database watermarking
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 

Andere mochten auch

12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
yuti_3011
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?
Delvinia
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
ijsrd.com
 

Andere mochten auch (16)

Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearning
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
QR code
QR codeQR code
QR code
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t Buy
 
watermarking
watermarkingwatermarking
watermarking
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
 
Surveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSurveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the Internet
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
60 312-318
60 312-31860 312-318
60 312-318
 

Ähnlich wie Digital watermarking

0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
authority12
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
10e11a0545
 
Watermarking
WatermarkingWatermarking
Watermarking
Abbas Ajmal
 

Ähnlich wie Digital watermarking (20)

Digital Watermarking.pptx
Digital Watermarking.pptxDigital Watermarking.pptx
Digital Watermarking.pptx
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Different kinds of watermarks
Different kinds of watermarksDifferent kinds of watermarks
Different kinds of watermarks
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
VladimirNovikovSlides.ppt
VladimirNovikovSlides.pptVladimirNovikovSlides.ppt
VladimirNovikovSlides.ppt
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Digital Asset Management
Digital Asset ManagementDigital Asset Management
Digital Asset Management
 

Kürzlich hochgeladen

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 

Kürzlich hochgeladen (20)

VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 

Digital watermarking

  • 2. wHat iS a watermark..?  Watermarking is an important mechanism applied to physical objects like bills, papers, garment labels ,product packing…  Physical objects can be watermarked using special dyes and inks or during paper manufacturing.
  • 3. CHaraCteriStiCS of watermarkS  The watermark is hidden from view during normal use, only become visible by adopting a special viewing process. – E.g. hold the bill up to light  The watermark carries information about the object in which it is hidden. – E.g. the authenticity of the bill – E.g. the trademark of the paper manufacturer
  • 4. HiStory of watermarking  The term “watermark” was probably originated from the German term “wassermarke”. Since watermark is of no importance in the creation of the mark, the name is probably given because the marks resemble the effects of water on paper.  Papers are invented in China over a thousand years ago. However, the first paper watermark did not appear until 1282, in Italy.
  • 5. HiStory of watermarking  By the 18th century, watermarks on paper in Europe and America had been used as trademarks, to record the manufactured date, or to indicate the size of original sheets.  Watermarks are commonly used on bills nowadays to avoid counterfeiting
  • 6. wHat iS Digital watermarking?  Watermarking can also be applied to digital signals! image video Audio
  • 7. HiStory of Digital watermarking  The first watermarking example similar to the digital methods nowadays appeared in 1954. The Muzak Corporation filed a patent for “watermarking” musical Work. An identification Work was inserted in music by intermittently applying a narrow notch filter centred at 1KHz.  About 1995, interest in digital watermarking began to mushroom.
  • 8. Definitions about Digital watermarking  Digital watermarking: – The practice of imperceptibly alternating a Work to embed a message about the Work.  – Related terms  Work: a specific copy of some electronic signal, such as a song, a video sequence, or a picture  Cover Work: the original un-watermarked work, since it covers (hides) the watermark  Watermark: the messages being embedded, indicating some information about the work
  • 10. types of watermark  Visible  A visible translucent image which is overlaid on the primary image  Invisible  An overlaid image which cannot be seen, but which can be detected algorithmically
  • 11. Visible watermark  Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still marks it clearly as the property of the owning organization.  Overlay the watermark in a way which makes it difficult to remove, if the goal of indicating property rights is to be achieved.
  • 13. inVisible watermark  Embedding level is too small to notice  Can be retrieved by extraction software  Applications: Authentication Copyrighting Etc…
  • 15. ApplicAtions of digitAl wAtermArking  Rights management  Contents management  Access/copy control  Authentication
  • 16. feAtures of wAtermArking  Invisible/Inaudible  Information is embedded without digital content degradation, because of the level of embedding operation is too small for human to notice the change.  Inseparable  The embedded information can survive after some processing, compression and format transformation.  Unchanging data file size  Data size of the media is not changed before and after embedding operation because information is embedded directly into the media.
  • 18. digitAl wAtermArking AlliAnce Represents applications and solutions for:  Audio and Music Content  Video, Movies and TV Content  Digital Imagery  Identity Documents  Value Documents
  • 20. digitAl wAtermArking exAmples  Copyright Communication  Copy Protection  Monitoring  Filtering/Classification  Authentication/Integrity  Product Serialization & Tracking  Asset/Content Management  Rights Management  Remote Triggering  Linking/E-Commerce
  • 21. copyright digitAl wAtermArk Architecture Audio/Video Master Embed Copyright and Content ID DWM Content Owner Provider Index Database Location (Centralized or Distributed) User’s PC Rip Software Compressed Audio/Video File (e.g. MP3 file) User Software Detect Copyright and Content ID DWM for Secure and Enhanced content Rights & Info Database Content ID linked to rights, information and related content Can be used to address P2P and social network content Identification needs as well as providing identification of orphan works and access to metadata/networked information
  • 22. Digital MeDia Serialization & tracking  Identifies content owners and rights while communicating copyright information  Awareness of watermarked content by consumer creates deterrent against unauthorized copying and distribution  Provides accurate identification of source of unauthorized content discovered on the Internet and/or physical media
  • 23. Protected for privacy Recordable Media Embed Serial # (2) Embed Serial # (1) Content ID Retail Content Content Provider Track and take proper action Detect Serial Number