Watermarking for Surveillance Tutorial

Author: John Honovich, Published on Aug 21, 2012

Watermarking is one of the most confusing aspects of surveillance. This can become a serious problem when watermarking is demanded by users (or courts) to prove the validity of surveillance evidence. In this note, we explain the two main ‘types' of watermarking and how watermarking is implemented in real world systems.

The Two Watermarking(s)

Unfortunately, watermarking has two common meanings that are radically different. You need to be very careful what someone means when they say ‘watermarking'.

  • Meaning 1: Image overlay - an image is placed on top of the surveillance video. The image is ‘watermarked' with an image of the company/owner/user of the surveillance system:

overlay added

  • Meaning 2: Digital hashing / digital watermarking - Every individual bit of the video is checked and a code is generated. Later, the video can be checked again. If the new code does not match the original code, the video must have been changed. This ‘watermarking' cannot be seen on the video/image but is far more sophisticated than image overlay.

Even More Advanced Watermarking?

Entertainment companies who want to protect their videos from online theft often seek even stronger watermarking protection. Instead of just proving that the video was not tampered, they want to determine who has distributed the video or where the video was distributed from. For instance, if a video is pirated, who leaked the video originally? This is sometimes called video fingerprinting. However, we have never seen a surveillance company implement this.

Choosing the Right Watermark

Since the two types are so radically different, choosing the right one for your application is easy:

  • Marketing / Branding - Use an image overlay as you want people to see that it is your organization while the risk of faking is low.
  • Evidence / Courts - Use digital hashing as you want assurance the video has not been tampered. NEVER use image overlay as a ten year old with simple software can fake that.

Where to Watermark

First, the easy and simple case - image overlay watermarking. This can be applied fairly anywhere and anytime - on most IP cameras, on most VMS systems as well as on basic video editing software even after video has been exported. The image below shows an example of this feature onboard a camera, in this case an Axis model:

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

overlay image

Digital Hash Watermarking Location

Where to apply a digital hash watermark is much more complex, both because of implementation constraints and evidentiary concerns.

The first question is: How early do you want (or need) the video to be watermarked? Does it have to be right away when the video is created (at the camera)? Can it wait until the video is recorded? Is it OK just to hash it when it is exported from the recorder?

Here are the options for digital hashing:

  • At the camera
  • When the recorder receives the video
  • When the recorder exports a video clip

However, in practice, statistically, digital hash watermarking is rarely done. Many, if not most courts, will accept exported surveillance video with no watermark at all. However, when digital hashes are applied it is typically applied when exporting from the recorder itself. Export configurations often have an option to enable digital watermarking.

Sometimes digital hashes can be applied when the video is first recorded but rarely is this available in IP cameras. Be especially vigilant to check any marketing claims of ‘digital watermarking' as often this only means image overlay, not digital hashes.

Digital Hash Watermarking Support in Surveillance Products

While variation exists, here are some rules of thumbs:

  • Most cameras support image overlay but very few support digital watermarking (exceptions - Mobotix and Axis cameras that use a 3rd party plugin from TRedess)
  • Most recorders do not support digital watermarking when the recorder receives the video (exceptions - Genetec has an option to do so but it increase CPU consumption similar to performing server side motion detection; also ipConfigure has an option using SHA512)
  • Most recorders do support digital watermarking for export though the method used can vary significantly. If you really care about digital watermarking, it may be worth checking what method they use.
Comments : PRO Members only. Login. or Join.

Related Reports on Tutorials

Installing Dome Cameras Indoors Guide on Jul 16, 2018
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...
Installation Hardware for Video Surveillance - Indoor Fasteners on Jun 22, 2018
As part of our Installation for Video Surveillance series, in this note, we cover drywall anchors. A key part of installing security hardware is...
Introducing Effective PPF (ePPF) - Improving Video Surveillance Designs on Jun 11, 2018
Pixel density (PPF / PPM) is the best metric the industry has to define and project video quality. It allows simple communication of estimated...
H.265 / HEVC Codec Tutorial on Jun 07, 2018
H.265 support has improved significantly in 2018, with H.265 camera/VMS compatibility increased compared to only a year ago, and more manufacturers...
Keypads For Access Control Tutorial on May 31, 2018
Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...
Access Visitor Management Systems Guide on May 11, 2018
"Who are you, and why are you here?" Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone,...
Access Control Card Printers Guide on May 03, 2018
Card printers are a core component of professional access control systems, often used as photos IDs and prominently displayed. Modern badges put...
Access Control Levels and Schedules Tutorial on May 01, 2018
Configuring access levels and setting up schedules is central to maintaining facility security. Many people may need to enter areas but most do not...

Most Recent Industry Reports

Amazon Ring Alarm System Tested on Jul 16, 2018
Amazon Ring is going to hurt traditional dealers, and especially ADT, new IPVM test results of Ring's Alarm system underscore. IPVM found that...
Hikvision Wins Chinese Government Forced Facial Recognition Project Across 967 Mosques on Jul 16, 2018
Hikvision has won a Chinese government tender which requires that facial recognition cameras be set up at the entrance of every single mosque...
Installing Dome Cameras Indoors Guide on Jul 16, 2018
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...
Security Sales Course Summer 2018 on Jul 13, 2018
Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security Sales Course Summer 2018 This...
US Tariffs Hit China Video Surveillance on Jul 13, 2018
Chinese video surveillance products avoided tariffs for the first two rounds. Now, in the third round, many video surveillance products will be...
Last Chance - July 2018 IP Networking Course on Jul 12, 2018
Registration ends today, Thursday. Register now. This is the only networking course designed specifically for video surveillance...
4 Most Difficult Camera Installs (Statistics) on Jul 12, 2018
Heavy housings, cumbersome brackets, heavy ladders required, and tricky field of view requirements will cause difficulties no matter the camera...
Axis Perimeter Defender Video Analytics Tested on Jul 12, 2018
Axis 'high security' video analytics offering is Perimeter Defender, OEMed / developed with Digital Barriers. But how good is Perimeter Defender?...
Hikvision Fights Ban - Claims 'Red Scare', Hires 14 Term Ex-Congressman on Jul 11, 2018
Hikvision is fighting back against the House Bill Ban of their products. Hikvision has hired one of the biggest lobbying firms, led by a 14 term...
Arecont Acquisition By Costar on Jul 11, 2018
Arecont Vision acquisition by Costar Technologies has been approved by the court, concluding the bankruptcy process triggered by Arecont's...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact