- Watermark (data file)
A watermark stored in a data file refers to a method for ensuring
data integritywhich combines aspects of data hashing and digital watermarking. Both are useful for tamper detection, however each has advantages and disadvantages.
A typical data hash will process an input file to produce an
alphanumericstring unique to the data file. Should the file be modified, such as if one or more bit changes occur within this original file, the same hash process on the modified file will produce a different alphanumeric. Through this method, a trusted source can calculate the hash of an original data file and subscribers can verify the integrity of the data. The subscriber simply compares a hash of the received data file with the known hash from the trusted source. This can lead to two situations: the hash being the same or the hash being different.
If the hash results are the same, the systems involved can have an appropriate degree of confidence to the integrity of the received data. On the other hand, if the hash results are different, they can conclude that the received data file has been altered.
A disadvantage of this hash process is that no indications exist as to the extent or location of changes within the received data file. Only two results can be given - the received data file is trustworthy or it isn't. Therefore, if there is a single change in the file, a hash check will fail and the data discarded.
This process is common in P2P networks, for example the BitTorrent protocol. Once a part of the file is downloaded, the data is then checked against the hash key (known as a hash check). Upon this result, the data is kept or discarded.
Digital watermarkingis distinctly different from data hashing. It is the process of altering the original data file, allowing for the subsequent recovery of embedded auxiliary data referred to as a watermark.
A subscriber, with knowledge of the watermark and how it is recovered, can determine (to a certain extent) whether significant changes have occurred within the data file. Depending on the specific method used, recovery of the embedded auxiliary data can be robust to post-processing (such as lossy compression).
If the data file to be retrieved is an image, the provider can embed a watermark for protection purposes. The process allows tolerance to some change, while still maintaining an association with the original image file. Researchers have also developed techniques that embed components of the image within the image. This can help identify portions of the image that may contain unauthorized changes and even help in recovering some of the lost data.
A disadvantage of
digital watermarkingis that a subscriber cannot significantly alter some files without sacrificing the quality or utility of the data. This can be true of various files including image data, audio data, and computer code.
* [http://www.digitalwatermarkingalliance.org/ The Digital Watermarking Alliance - Furthering the Adoption of Digital Watermarking]
Wikimedia Foundation. 2010.
Look at other dictionaries:
Watermark (disambiguation) — Watermark can refer to:* Watermark, a recognizable image or pattern in paper used to identify authenticity * Digital watermarking, a technique to embed data in digital audio, images or video * Watermark (album), a 1988 album by Enya * Watermark… … Wikipedia
watermark — 1. noun a) A translucent design impressed on the surface of paper and visible when the paper is held to the light. b) Auxiliary data embedded in a datafile for subsequent identification and verification of the file. 2. verb … Wiktionary
digital watermark — UK US noun [C] ► IT a piece of electronic information that is put into a computer file and that cannot be removed, showing who created or owns the file: »In order to view a digital watermark, you need a special program that can extract the… … Financial and business terms
Digital watermarking — An image with visible digital watermarking the text Brian Kell 2006 is visible across the center of the image Digital watermarking is the process of embedding information into a digital signal which may be used to verify its authenticity or the… … Wikipedia
Relational database — A visual diagram showing the relationship between the two tables, as indicated by the arrow A relational database matches data by using common characteristics found within the data set. The resulting groups of data uses the relational model (a… … Wikipedia
Digital Watermarking Alliance — The Digital Watermarking Alliance is a group of like minded companies that share a common interest in furthering the adoption of digital watermarking. The mission of the Digital Watermarking Alliance is: to create awareness and promote the value… … Wikipedia
Практическое применение раскраски графов — Эту статью следует викифицировать. Пожалуйста, оформите её согласно правилам оформления статей. Раскраска графов практически применяется (постановку задачи различиных раскрасок здесь обсуждаться не будет) дл … Википедия
List of PDF software — This list of PDF software includes links to articles on computer software used to manage Portable Document Format (PDF) documents. Contents 1 Multi platform 1.1 Converters 1.2 Editors 1.3 … Wikipedia
Steganography — is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures the meaning of a message, but it does not conceal … Wikipedia
Microsoft Identity Integration Server — (MIIS) is an identity management (IdM) product offered by Microsoft. It is a service that aggregates identity related information from multiple data sources. The goal of MIIS is to provide organizations with a unified view of a user s/resources… … Wikipedia