Watermarking for Surveillance Tutorial

Author: John Honovich, Published on Aug 21, 2012

Watermarking is one of the most confusing aspects of surveillance. This can become a serious problem when watermarking is demanded by users (or courts) to prove the validity of surveillance evidence. In this note, we explain the two main ‘types' of watermarking and how watermarking is implemented in real world systems.

The Two Watermarking(s)

*************, ************ *** *** ****** ******** **** *** ********* *********. You **** ** ** **** ******* **** ******* ***** **** they *** ‘************'.

  • ******* *: ***** ******* - ** ***** ** ****** ** top ** *** ************ *****. *** ***** ** ‘***********' **** an ***** ** *** *******/*****/**** ** *** ************ ******:

overlay added

  • ******* *:******* ******* / ******* ************- ***** ********** *** ** *** ***** ** ******* *** a **** ** *********. *****, *** ***** *** ** ******* again. ** *** *** **** **** *** ***** *** ******** code, *** ***** **** **** **** *******. **** ‘************' ****** be **** ** *** *****/***** *** ** *** **** ************* than ***** *******.

Even **** ******** ************?

************* ********* *** **** ** ******* ***** ****** **** ****** theft ***** **** **** ******** ************ **********. ******* ** **** proving **** *** ***** *** *** ********, **** **** ** determine *** *** *********** *** ***** ** ***** *** ***** was *********** ****. *** ********, ** * ***** ** *******, who ****** *** ***** **********? **** ** ********* *********** **************. *******, ** **** ***** **** * ************ ******* ********* this.

Choosing *** ***** *********

***** *** *** ***** *** ** ********* *********, ******** *** right *** *** **** *********** ** ****:

  • ********* / ******** - *** ** ***** ******* ** *** want ****** ** *** **** ** ** **** ************ ***** the **** ** ****** ** ***.
  • ******** / ****** - *** ******* ******* ** *** **** assurance *** ***** *** *** **** ********. ***** *** ***** overlay ** * *** **** *** **** ****** ******** *** fake ****.

Where ** *********

*****, *** **** *** ****** **** - ***** ******* ************. This *** ** ******* ****** ******** *** ******* - ** most ** *******, ** **** *** ******* ** **** ** on ***** ***** ******* ******** **** ***** ***** *** **** exported. *** ***** ***** ***** ** ******* ** **** ******* onboard * ******, ** **** **** ** **** *****:

overlay image

******* **** ************ ********

***** ** ***** * ******* **** ********* ** **** **** complex, **** ******* ** ************** *********** *** *********** ********.

*** ***** ******** **: *** ***** ** *** **** (** need) *** ***** ** ** ***********? **** ** **** ** be ***** **** **** *** ***** ** ******* (** *** camera)? *** ** **** ***** *** ***** ** ********? ** it ** **** ** **** ** **** ** ** ******** from *** ********?

**** *** *** ******* *** ******* *******:

  • ** *** ******
  • **** *** ******** ******** *** *****
  • **** *** ******** ******* * ***** ****

*******, ** ********, *************, ******* **** ************ ** ****** ****. Many, ** *** **** ******, **** ****** ******** ************ ***** with ** ********* ** ***. *******, **** ******* ****** *** applied ** ** ********* ******* **** ********* **** *** ******** itself. ****** ************** ***** **** ** ****** ** ****** ******* watermarking.

********* ******* ****** *** ** ******* **** *** ***** ** first ******** *** ****** ** **** ********* ** ** *******. Be ********** ******** ** ***** *** ********* ****** ** ‘******* watermarking' ** ***** **** **** ***** ***** *******, *** ******* hashes.

Digital **** ************ ******* ** ************ ********

***** ********* ******, **** *** **** ***** ** ******:

  • **** ******* ******* ***** ******* *** **** *** ******* ******* watermarking (********** - ******* *** **** ******* **** *** * 3rd ***** ****** ***********)
  • **** ********* ** *** ******* ******* ************ **** *** ******** receives *** ***** (********** - ******* *** ** ****** ** do ** *** ** ******** *** *********** ******* ** ********** server **** ****** *********; **** *********** *** ** ****** ***********)
  • **** ********* ** ******* ******* ************ *** ****** ****** *** method **** *** **** *************. ** *** ****** **** ***** digital ************, ** *** ** ***** ******** **** ****** **** use.
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Tutorials

Power Drill Selection Guide on Dec 06, 2016
Boring holes is a basic part of running cables for most security system projects. To do so, you will need to choose the right drills for various...
Solutions to 5 Common Access Control Problems on Nov 21, 2016
Effective security is more than just good equipment. In fact, thousands of dollars in electronic access control can be wasted if they are not used...
Intrusion Motion Sensors Tutorial on Oct 04, 2016
Motion sensors are one of the most common, and most useful alarm sensors, but they also often cause problems. Many motion sensors types exist and...
Access Door Controller Configuration Guide on Sep 27, 2016
Properly configuring access control door controllers is key to a professional system. These devices have fundamental settings that must be...
VLANs for Video Surveillance Tutorial on Sep 26, 2016
Many people confidently say to 'use VLANs' as an answer to IP video networking problems and as a way to signal expertise. But how should VLANs be...
Door Fundamentals For Electronic Access Control on Sep 20, 2016
Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be...
How to Measure Video Quality / Compression Levels on Sep 16, 2016
Two cameras have the same resolution, frame rate and scene monitored but camera A consumes half the bandwidth than camera B. Is Camera A better?...
PTZ Camera Guide 2016 on Sep 15, 2016
Pan/Tilt/Zoom cameras remain critical parts of many surveillance systems, especially in large security operations. Because of this it is important...
Panoramic Camera (Fisheye / Multi-Imager) Guide on Aug 31, 2016
Panoramic cameras, including fisheyes and multi-imagers, have become increasingly widespread, with most manufacturers offering fisheyes and an...
Tailgating - Access Control Tutorial on Aug 25, 2016
Despite costing thousands of dollars per door, electronic access control systems are vulnerable to an easy exploit called 'tailgating'. Unless this...

Most Recent Industry Reports

The Russian SMP Security Robot on Dec 08, 2016
A Russian manufacturer, SMP, has a commercially available outdoor security robot, at a lower price and with much less marketing than their main...
How Hikvision Beats Its OEMs on Dec 08, 2016
Hikvision GM declared that they are not aggressive with their competitors. But some of their own OEM partners disagree. Inside, we reveal a key...
Dahua Discontinuing H.264 Only Products on Dec 08, 2016
Dahua has taken a stand for H.265 and is discontinuing its H.264 only products. We examine the shakeup inside this...
Last Day Save $50 IP Networking Course January 2017 on Dec 08, 2016
Today is the last day to save $50 on next month's IP networking course. This is the only networking course designed specifically for video...
Hikvision vs Dahua Mobile Apps Tested on Dec 07, 2016
With smartphone use and low-cost video recorders surging, many user's main interface to their surveillance system is their phone. With mobile video...
Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Axis Partner Elder Care Video Analytics (Smartervision) on Dec 07, 2016
Can video analytics be used to improve the care of the elderly? Axis and a video analytics startup, Smartervision, are working together to do so....
Sony IP Camera Backdoor Uncovered on Dec 06, 2016
A backdoor has been uncovered in ~80 Sony IP camera models, attackers can remotely enable telnet on the camera, and then potentially login as root,...
Power Drill Selection Guide on Dec 06, 2016
Boring holes is a basic part of running cables for most security system projects. To do so, you will need to choose the right drills for various...
Milestone Favorability Results on Dec 06, 2016
In our second installment of manufacturer favorability results (first was Pelco), we turn to Milestone. 100+ integrators rated and explained what...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact