TRL
TOP PAGETokyo Research LaboratoryEmploymentProjectsRelated InformationIBM Research
Japanese page is here.

Science and Technology of DataHidingTM

DataHiding(TM) image

* This research project has been completed.

The IBM DataHidingTM technology allows the user to optimize the overall trade-off among the competing requirements of data capacity (payload), transparency, reliability, survivability, and security.

DataHidingTM base algorithm

The embedding process consists of

The detection process consists of

Detection Process

The pseudo-random noise pattern and the pseudo-random noise mask do not need to be identical.

Return to top of page

High Transparency

High transparency is achieved by the elaborated perceptual model which IBM Research Tokyo Research Laboratory has developed for each media type of image, video and audio. Embedding process is essentially to change slightly value of each digital sampling point of target content. The perceptual model computes threshold of changes for transparency. It should be noted that the threshold cannot be expressed in point-wise way . This is clear when we consider the perceptual model of audio, psycho-acoustic model. IBM also found that this is true for image and video.

Return to top of page

High reliability

In detecting a watermark, three types of error may occur, since the embedded message is extracted from the distributed content without any reference to the original content.

The second and third types of errors depend on what kind of signal processing is applied to the embedded content. Therefore, the ratio for which the right embedded message is retrieved after signal processing is called the survivability ratio, and is discussed in the section on Survivability.

False positive errors are contrary to the interests of consumers when the detectors are located inside consumers devices for controlling record and playback. Therefore, consumer electronic manufacturers require that the false positive error ratio should be extremely low. In the case of DVD-video, the required ratio is less than one error in 1013 seconds = about three hundred thousands years. In case of DVD-audio, requested is less than one error in 1.5*1013 seconds = about five hundred thousands years. The problem is how to confirm this kind of extremely low false positive error ratio. IBM Research Tokyo Research Laboratory (TRL) developed a probability theory for computing the false positive error ratio. In this theory, the false positive error ratio is computed by the ratio of the number of failed detection procedures to the total number of possible detection procedures for a given content. The theory was successfully tested by applying it with a real-time detector to video signals of NHK satellite broadcast during two weeks.

Return to top of page

High survivability

Digital content undergoes many processing steps such as noise reduction and compression before its physical and electronic distribution. After distribution, it may undergo various editing processes within or outside the contract on its usage. A popular existing way of illegally copying copy-protected content is to use analog output from speakers and monitors. Therefore, the embedded watermark is required to survive various types of signal processing and analog transmission.

The IBM watermark remains after signal processing unless the later heavily damages the visual or audio quality, since the algorithm accumulates the stream of content modulated with a pseudo-random noise mask and extracts the embedded message by statistical inference from the accumulated values. Therefore, the IBM effort is mostly concerned with how to accelerate the detection process without decreasing reliability.

Further, for video DataHiding, the IBM technology uses an adaptive frame accumulation method for reliable extraction from weakly embedded data

The robustness of each media type is described in the following pages:

Return to top of page

High security

Security is necessary to protect a watermarking application from various types of threats. IBM has outstanding experience and discipline in security matters.

The main potential risks are as follows.

R1. External attacks on watermarks

An external attacker tries to remove or modify an embedded watermark with or without knowledge of the watermarking method. He may use a commercially available editing and signal-processing tool or develop his own tool on the basis of his analysis of the embedded digital content.

R2. External attacks on watermarking tool

An external attacker may apply reverse engineering or modify the watermark detector or embedder if application frameworks require them to be distributed. In the control/audit framework, he may circumvent the watermark detector if it is not tightly coupled with the digital content application system (see DataHiding Application Framework).

R3. Internal attacks by an employee of the content owner or distributor

An employee of the content owner or distributor may modify an embedded watermark by making unauthorized use of a company-owned embedding system. He may access an original content and its embedded content to compute their difference and use it to remove watermarks from of other contents.

R4. Internal attacks by employee of watermarking system provider

An employee of a watermarking system provider may use secret information to which he had accesse during the development of the system.

IBM DataHidingTM has defensive measures against possible risks.

D1. Tamper-resistance of watermark

The IBM watermark survives various signal processing, including random attacking such as addition of noise (See Survivability   and Tamper-Resistant Watermarking.)

D2. Separation of key from algorithm

Pseudo-random noise masks and patterns function as keys. (See DataHiding Base Algorithm.) The IBM technology supports a huge number of pseudo-random noise masks and patterns, which make dictionary attack impossible. The different masks and patterns do not interfere with each other.

D3. Resistance to software tampering and reverse engineering

Technology developed by IBM's Almaden Research Center is used for this purpose.

D4. Secure embedding system

The IBM professional embedding system requires authentication for its use. The system does not allow updating of watermarks since we can assume that the real content owner has the original content. Operators are only allowed to add watermarks.

D5. Control of implementation information through fragmentation

Separation of the key from the algorithm is the simplest example of this control. The exposure by a malicious employee of a watermarking system provider can be prevented by limiting individuals' knowledge through fragmentation.

D6. Other Traps

For example, the IBM system makes it ineffective to apply the difference between the original and embedded content in order to remove watermarks from other contents.

Return to top of page

DataHiding Home Page

Research home IBM home Order Privacy Legal Contact IBM
Last modified 16 Feb 2001