Watermarking for Surveillance Tutorial

Author: John Honovich, Published on Aug 21, 2012

Watermarking is one of the most confusing aspects of surveillance. This can become a serious problem when watermarking is demanded by users (or courts) to prove the validity of surveillance evidence. In this note, we explain the two main ‘types' of watermarking and how watermarking is implemented in real world systems.

The Two Watermarking(s)

Unfortunately, watermarking has two common meanings that are radically different. You need to be very careful what someone means when they say ‘watermarking'.

  • Meaning 1: Image overlay - an image is placed on top of the surveillance video. The image is ‘watermarked' with an image of the company/owner/user of the surveillance system:

overlay added

  • Meaning 2: Digital hashing / digital watermarking - Every individual bit of the video is checked and a code is generated. Later, the video can be checked again. If the new code does not match the original code, the video must have been changed. This ‘watermarking' cannot be seen on the video/image but is far more sophisticated than image overlay.

Even More Advanced Watermarking?

Entertainment companies who want to protect their videos from online theft often seek even stronger watermarking protection. Instead of just proving that the video was not tampered, they want to determine who has distributed the video or where the video was distributed from. For instance, if a video is pirated, who leaked the video originally? This is sometimes called video fingerprinting. However, we have never seen a surveillance company implement this.

Choosing the Right Watermark

Since the two types are so radically different, choosing the right one for your application is easy:

  • Marketing / Branding - Use an image overlay as you want people to see that it is your organization while the risk of faking is low.
  • Evidence / Courts - Use digital hashing as you want assurance the video has not been tampered. NEVER use image overlay as a ten year old with simple software can fake that.

Where to Watermark

First, the easy and simple case - image overlay watermarking. This can be applied fairly anywhere and anytime - on most IP cameras, on most VMS systems as well as on basic video editing software even after video has been exported. The image below shows an example of this feature onboard a camera, in this case an Axis model:

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

overlay image

Digital Hash Watermarking Location

Where to apply a digital hash watermark is much more complex, both because of implementation constraints and evidentiary concerns.

The first question is: How early do you want (or need) the video to be watermarked? Does it have to be right away when the video is created (at the camera)? Can it wait until the video is recorded? Is it OK just to hash it when it is exported from the recorder?

Here are the options for digital hashing:

  • At the camera
  • When the recorder receives the video
  • When the recorder exports a video clip

However, in practice, statistically, digital hash watermarking is rarely done. Many, if not most courts, will accept exported surveillance video with no watermark at all. However, when digital hashes are applied it is typically applied when exporting from the recorder itself. Export configurations often have an option to enable digital watermarking.

Sometimes digital hashes can be applied when the video is first recorded but rarely is this available in IP cameras. Be especially vigilant to check any marketing claims of ‘digital watermarking' as often this only means image overlay, not digital hashes.

Digital Hash Watermarking Support in Surveillance Products

While variation exists, here are some rules of thumbs:

  • Most cameras support image overlay but very few support digital watermarking (exceptions - Mobotix and Axis cameras that use a 3rd party plugin from TRedess)
  • Most recorders do not support digital watermarking when the recorder receives the video (exceptions - Genetec has an option to do so but it increase CPU consumption similar to performing server side motion detection; also ipConfigure has an option using SHA512)
  • Most recorders do support digital watermarking for export though the method used can vary significantly. If you really care about digital watermarking, it may be worth checking what method they use.
Comments : PRO Members only. Login. or Join.

Related Reports on Tutorials

'As-Built' Drawings Tutorial on Mar 20, 2018
Closeout documentation can be invaluable for future expansions or maintenance work, and 'as-built' drawings are a key aspect for finishing projects...
Access Control - Restricted Keys Guide on Mar 15, 2018
Not all doors, even in larger facilities, can justify using electronic access control. And even for doors that do have electronic access control,...
Rack Mounting NVRs Tutorial on Mar 14, 2018
Rack mounting recorders is common in professional systems, but manufacturers are making it difficult, with simple design failures causing multiple...
Vehicle Gate Access Control Guide on Mar 07, 2018
Vehicle gate access control demands integrating myriad systems to keep unauthorized cars out. Everything from high voltage electrical, to...
Cellular (4G / LTE / 5G) For Video Surveillance Guide on Mar 06, 2018
In this report, we explain using cellular for video surveillance including: 4G vs LTE vs 5G 4G standards 5G future Advantage: Placing cameras...
Door Position Switches (DPS) For Access Control Tutorial on Mar 05, 2018
Door position switches do not get enough respect. They solve a major problem of access control systems yet are frequently ignored or...
Dynamic vs. Static IP Addresses Tutorial on Mar 01, 2018
While many cameras default to DHCP out of the box, that does not mean you should use it. This may seem basic for some, but those new to the...
Remote Network Access for Video Surveillance Guide on Feb 21, 2018
Remotely accessing surveillance systems is key in 2018, with more and more users relying on mobile apps as their main way of operating the system....
Multicasting Surveillance Tutorial on Jan 04, 2018
Network bandwidth can be a concern for some surveillance systems. While improvements in video codecs, such as smart codecs for H.264 and H.265,...
Cabling Best Practices Guide on Jan 03, 2018
Surveillance cabling can be a major problem. Poorly installed and maintained networks are often costly, lengthy, frustrating ordeals to...

Most Recent Industry Reports

Final Day - Save $50 - April 2018 IP Networking Course on Mar 22, 2018
Today, March 22nd is the last day to save $50. Register now and save. NEW - 2 sessions per class, 'day' and 'night' to give you double the chance...
Favorite Access Control Credentials 2018 on Mar 22, 2018
In this 2018 access integrator statistics result, which credential type holds the favored spot to unlock access doors? More than 150 integrators...
ISC West Bans Booth Babes on Mar 22, 2018
Booth babes, goodbye. Technically, ISC West banned them 2 years ago with a 'staffing attire' requirement but it looks like ISC West is going to...
Hikvision Fails To Fix Unsafe Browser Plugin on Mar 21, 2018
More than 2 years ago, Hikvision committed to resolving the use of unsafe and ineffective browser plugins. Despite that, today, Hikvision still has...
Network Racks For Surveillance Guide on Mar 21, 2018
In this guide, we look at network rack infrastructure, one of the fundamentals of IP video surveillance. Inside, we cover: What is a rack unit...
Security Robot Sales Struggle on Mar 21, 2018
2 year ago, PSA Security CEO Bill Bozeman called security robots one of “the biggest game changers” in decades for security integrators. Just over...
Dahua Global Launch LeChange on Mar 20, 2018
Dahua is getting into the consumer video surveillance market globally, with "LeChange", an offering long available inside of China is now being...
Axis Z-Wave IP Camera Tested Poorly on Mar 20, 2018
Z-Wave is drawing notable interest for video surveillance use. In IPVM's initial coverage, 84% expressed interest in it, with nearly half being...
'As-Built' Drawings Tutorial on Mar 20, 2018
Closeout documentation can be invaluable for future expansions or maintenance work, and 'as-built' drawings are a key aspect for finishing projects...
Hikvision RSM Professional Misconduct on Mar 19, 2018
A Hikvision RSM engaged in professional misconduct of a US State's licensing law, involving continuing education held at an ADI branch. In this...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact