Digital Watermarking: Intellectual Property Protection for the Internet?

By Hawkins, Donald T. | Online, July/August 1998 | Go to article overview

Digital Watermarking: Intellectual Property Protection for the Internet?


Hawkins, Donald T., Online


Recently I received a check and across the top was the legend, "This document contains a watermark. Hold at an angle to view." Watermarking-impressing a design into the fibers of paper during its manufacture-has been well-known since the earliest days of paper making. It is used for security, to indicate paper quality, or in business environments, as a subtle promotional technique. Generally, there is no attempt to hide a watermark, and especially in security applications, one's attention is often deliberately drawn to it to validate the genuineness of a document.

Currently, much research and development is focused on digital watermarking technology, which shows promise as a way to protect the rights of digital information owners. Digital watermarks differ from printed ones because they are usually hidden from the user and can be applied to several different types of media-text, images, and even sound. Such versatility makes digital watermarks very attractive to many people who would like to add security to their products, such as publishers, music producers, and photographers.

TECHNOLOGY OF DIGITAL WATERMARKING

Digital watermarking can be considered part of the science of steganography which literally means "covered writing." (The Greek root stega- means "to cover.") According to Johnson's excellent review of the history and theory of steganography [1], Steganography is the art and science of communicating in a way which hides the existence of communication. In contrast to cryptography, where the enemy is allowed to detect, intercept, and modify messages...the goal of steganography is to hide messages inside other harmless messages in a way that does not allow the enemy to even detect that there is a second secret message present.

Other terms relevant to digital watermarking are data hiding and information hiding. Two international conferences on information hiding were held, one in 1996 and another in April 1998. Many papers describing research on digital watermarking and steganography can be found in the proceedings of those conferences.

In researching this article, I found several excellent Web sites dealing with digital watermarking and steganography (see the sidebar). Some of these sites are additionally useful because they offer extensive directories of links to additional relevant sites.

Digital watermarking uses naturally occurring variations of text and images, and thus cannot be seen by the user unless special techniques are employed. A watermark can be embedded into an electronic image, for example, by slightly changing the brightness of some of its pixels in a regular or even random pattern. Because the watermarking changes are so slight, the human eye cannot readily detect them. The watermark can be dispersed throughout the image so that it is very difficult to remove even if detected. In the case of text, the same effect can be achieved by slightly varying the spacing between the lines and characters that make up the document. With sounds, watermarking software can disperse messages throughout the sound file that can be read by a computer, but are imperceptible to human ears.

Proponents of digital watermarks claim that they are not only difficult to detect, but they will survive copying, printing, and electronic manipulations or transformations into other file types because they cause only slight changes to the original medium. Thus, digital watermarking may offer the potential of tamper-proof security for intellectual property distributed over the Internet.

WATERMARKING APPLICATIONS

Digital watermarking has attracted the attention of some major corporations, which are actively conducting research and developing applications. For example:

Researchers at AT&T Research Laboratories are working with textual material and have published several articles in technical journals discussing their results.

IBM is using watermarking in a large project to digitize the Vatican library [2]. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Digital Watermarking: Intellectual Property Protection for the Internet?
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.