Multimedia authenticity with ICA watermarks

Steven E. Noel, Harold H. Szu, Harold H. Szu, Martin Vetterli, William J. Campbell, James R. Buss
2000 Wavelet Applications VII  
For the first time the blind source de-mixing is applied to authenticity protection for multimedia products. We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the approaches. We then introduce the de-mixing algorithm, based on independent component analysis (ICA) seeking statistically factorized probability density and yielding a fast de-mixing
more » ... puting using unsupervised artificial neural networks. We describe how their blind demixing capability extends signal processing from the conventional one-sensor approach to a multi-sensor approach, as in the 2 eyes and 2 ears of human sensor systems but packaged in a spatio-temporal multiplexing fashion. For trademark security, a covert ICA can serve as a dormant digital watermark embedded within the multimedia data. Unauthorized removal of the trademark as plagiarism could degrade the quality of the content data (not shown here). We show how these new approaches contribute to a flexible, robust, and relative secure system for protecting the authenticity of multimedia products.
doi:10.1117/12.381712 fatcat:ubi6tewzdnfaxkcq2mgpagsj2u