Sudoku saves photographers from copyright theft

September 05, 2013

A new watermarking technology based on a system akin to the permutation rules used to solve the numeral puzzles known as Sudoku has been developed by computer scientists in Malaysia. Writing in the International Journal of Grid and Utility Computing the team reports how their system could resist attempts to "crop" the watermark in more than nine times out of ten cases.

Images, photos and graphics on the web are easy pickings for plagiarists and those who might ignore copyright rules. Photographers and others often add a watermark to their images to reduce the risk of their images being lifted for use on others' sites without permission. However, those intent on leeching an image might simply crop the watermark in some cases.

With the proliferation of digital multimedia content on the internet, content owners and service providers require robust technology to protect their work. Digital watermarking is commonly used to embed specific information into the media to be protected, such as a company's logo or product serial number. Such information can later be extracted and used to detect forgery and unauthorized usage and to prove authenticity and provenance. Importantly, a digital watermark must not distort or disrupt display of the image when used in its rightful place and so needs to be imperceptible in use.

Now, Shamsul Khalid of the Universiti Tun Hussein Onn Malaysia, in Johor, and colleagues, explain how a valid 9x9 Sudoku solution - comprising a pixelated second image - is used to create the watermark so that it is evenly distributed within an image and so that it resists automated cropping and noise additions by bots and other tools that scrape images from websites and add them to an illicit database for unlicensed resale or distribution to other websites that require a range of unique images but do not wish to pay for the privilege.

The approach uses the permutations of rows and columns in Sudoku solutions to create and detect an invisible digital watermark that is overlaid on an image with a random distribution. If the image pirate crops part of the image, then the chances are that enough of the watermark will remain elsewhere in the image that the complete watermark might be retrievable provided that the precise and correct Sudoku solution is given.

The team's initial tests showed that with 81 9x9 Sudoku solutions they could defeat more than 94% of attempts at cropping. They are currently implementing 256 16x16 Sudoku, which they suggest will be even stronger. The best "anti-cropping" watermarks used previously achieved only 75% resistance. Moreover, the Sudoku approach does not require investigators or the authorities to have access to the original image. Based on the relationship between full and partially recovered watermarks, the Sudoku approach will be able to discern whether a pirated image has the copyright owner's watermark.
"Anti-cropping digital image watermarking using Sudoku" in Int. J. Grid and Utility Computing, 2013, 4, 169-177

Inderscience Publishers

Related Internet Articles from Brightsurf:

Towards an unhackable quantum internet
Harvard and MIT researchers have found a way to correct for signal loss with a prototype quantum node that can catch, store and entangle bits of quantum information.

Swimming toward an 'internet of health'?
In recent years, the seemingly inevitable 'internet of things' has attracted considerable attention: the idea that in the future, everything in the physical world -- machines, objects, people -- will be connected to the internet.

Everything will connect to the internet someday, and this biobattery could help
In the future, small paper and plastic devices will be able to connect to the internet for a short duration, providing information on everything from healthcare to consumer products, before they are thrown away.

Your body is your internet -- and now it can't be hacked
Purdue University engineers have tightened security on the 'internet of body.' Now, the network you didn't know you had is only accessible by you and your devices, thanks to technology that keeps communication signals within the body itself.

What's next for smart homes: An 'Internet of Ears?'
A pair of electrical engineering and computer science professors in Cleveland, Ohio, have been experimenting with a new suite of smart-home sensors.

Child-proofing the Internet of Things
As many other current, and potentially future, devices can connect to the Internet researchers are keen to learn more about how so called IoT devices could affect the privacy and security of young people.

Quantum internet goes hybrid
ICFO researchers report the first demonstration of an elementary link of a hybrid quantum information network, using a cold atomic cloud and a doped crystal as quantum nodes as well as single telecom photons as information carriers.

Connecting up the quantum internet
Major leap for practical building blocks of a quantum internet: Published in Nature Physics, new research from an Australian team demonstrates how to dramatically improve the storage time of a telecom-compatible quantum memory, a vital component of a global quantum network.

Internet searches for suicide after '13 Reasons Why'
Internet searches about suicide were higher than expected after the release of the Netflix series '13 Reasons Why' about the suicide of a fictional teen that graphically shows the suicide in its finale, according to a new research letter published by JAMA Internal Medicine.

Weaponizing the internet for terrorism
Writing in the International Journal of Collaborative Intelligence, researchers from Nigeria suggest that botnets and cyber attacks could interfere with infrastructure, healthcare, transportation, and power supply to as devastating an effect as the detonation of explosives of the firing of guns.

Read More: Internet News and Internet Current Events is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to