Watermarking for Surveillance Tutorial

Author: John Honovich, Published on Aug 21, 2012

Watermarking is one of the most confusing aspects of surveillance. This can become a serious problem when watermarking is demanded by users (or courts) to prove the validity of surveillance evidence. In this note, we explain the two main ‘types' of watermarking and how watermarking is implemented in real world systems.

The Two Watermarking(s)

Unfortunately, watermarking has two common meanings that are radically different. You need to be very careful what someone means when they say ‘watermarking'.

  • Meaning 1: Image overlay - an image is placed on top of the surveillance video. The image is ‘watermarked' with an image of the company/owner/user of the surveillance system:

overlay added

  • Meaning 2: Digital hashing / digital watermarking - Every individual bit of the video is checked and a code is generated. Later, the video can be checked again. If the new code does not match the original code, the video must have been changed. This ‘watermarking' cannot be seen on the video/image but is far more sophisticated than image overlay.

Even More Advanced Watermarking?

Entertainment companies who want to protect their videos from online theft often seek even stronger watermarking protection. Instead of just proving that the video was not tampered, they want to determine who has distributed the video or where the video was distributed from. For instance, if a video is pirated, who leaked the video originally? This is sometimes called video fingerprinting. However, we have never seen a surveillance company implement this.

Choosing the Right Watermark

Since the two types are so radically different, choosing the right one for your application is easy:

  • Marketing / Branding - Use an image overlay as you want people to see that it is your organization while the risk of faking is low.
  • Evidence / Courts - Use digital hashing as you want assurance the video has not been tampered. NEVER use image overlay as a ten year old with simple software can fake that.

Where to Watermark

First, the easy and simple case - image overlay watermarking. This can be applied fairly anywhere and anytime - on most IP cameras, on most VMS systems as well as on basic video editing software even after video has been exported. The image below shows an example of this feature onboard a camera, in this case an Axis model:

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

overlay image

Digital Hash Watermarking Location

Where to apply a digital hash watermark is much more complex, both because of implementation constraints and evidentiary concerns.

The first question is: How early do you want (or need) the video to be watermarked? Does it have to be right away when the video is created (at the camera)? Can it wait until the video is recorded? Is it OK just to hash it when it is exported from the recorder?

Here are the options for digital hashing:

  • At the camera
  • When the recorder receives the video
  • When the recorder exports a video clip

However, in practice, statistically, digital hash watermarking is rarely done. Many, if not most courts, will accept exported surveillance video with no watermark at all. However, when digital hashes are applied it is typically applied when exporting from the recorder itself. Export configurations often have an option to enable digital watermarking.

Sometimes digital hashes can be applied when the video is first recorded but rarely is this available in IP cameras. Be especially vigilant to check any marketing claims of ‘digital watermarking' as often this only means image overlay, not digital hashes.

Digital Hash Watermarking Support in Surveillance Products

While variation exists, here are some rules of thumbs:

  • Most cameras support image overlay but very few support digital watermarking (exceptions - Mobotix and Axis cameras that use a 3rd party plugin from TRedess)
  • Most recorders do not support digital watermarking when the recorder receives the video (exceptions - Genetec has an option to do so but it increase CPU consumption similar to performing server side motion detection; also ipConfigure has an option using SHA512)
  • Most recorders do support digital watermarking for export though the method used can vary significantly. If you really care about digital watermarking, it may be worth checking what method they use.
Comments : PRO Members only. Login. or Join.

Related Reports on Tutorials

IP Camera Cable Labeling Guide on Sep 14, 2018
Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly...
Drain Wire For Access Control Reader Tutorial on Sep 04, 2018
An easy-to-miss cabling specification plays a key role in access control, yet it is commonly ignored. The drain wire offers protection for readers...
Exit Devices For Access Control Tutorial on Aug 28, 2018
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety codes the world over, and become integral parts of electronic access...
Inputs/Outputs For Video Surveillance Guide on Aug 24, 2018
While many cameras have Input/Output (I/O) ports, few are actually used and most designers do not even consider them. However, a good understanding...
Backup Power for Large Security Systems Tutorial on Aug 24, 2018
Choosing the right backup power system depends on system size. While small and medium systems greatly benefit from using UPS battery backup...
Backboxes for Video Surveillance Tutorial on Aug 15, 2018
Backboxes are a necessity in surveillance, whether for managing cable whips, recessing cameras, adding wireless radios. But it can be confusing to...
Camera Focusing Tutorial on Aug 09, 2018
A camera's focus is fundamental to quality imaging. Mistakes can cause important problems. In this guide, we explain focus issues and proper...
Installing Surveillance Cameras Into Synthetic Stucco (EIFS) Tutorial on Jul 30, 2018
Mounting cameras into synthetic stucco, commonly known as EIFS finishes, can be problematic If not properly planned, EIFS/stucco can be downright...
Door Swing Tutorial on Jul 24, 2018
The direction a door swings might seem minor, but it can greatly impact door hardware selection. There are four basic ways a door can swing, and...
Installing Dome Cameras Indoors Guide on Jul 16, 2018
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...

Most Recent Industry Reports

25% China Tariffs Finalized For 2019, 10% Start Now, Includes Select Video Surveillance on Sep 18, 2018
A surprise move: In July, when the most recent tariff round was first announced, the tariffs were only scheduled for 10%. However, now, the US...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
Hikvision USA Starts Layoffs on Sep 18, 2018
Hikvision USA has started layoffs, just weeks after the US government ban was passed into law. Inside this note, we examine: The important...
Chinese Government Praises Hikvision Following Xi Jinping on Sep 17, 2018
The Chinese government council responsible for managing China's state-owned companies praised Hikvision’s obedience to China’s authoritarian leader...
Amazon Ring Spotlight Cam Tested on Sep 17, 2018
Amazon's Ring has released their latest camera entry, the Spotlight Cam, which we bought and tested in our Consumer IP Camera Analytics...
European Mega Security Firm Verisure Pushing Security Fog on Sep 17, 2018
The European mega security firm Verisure (Securitas Direct), with a reported 2 million customers, is pushing security fog, as shown in this BBC...
IP Camera Cable Labeling Guide on Sep 14, 2018
Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly...
Favorite Intercom Manufacturers 2018 on Sep 14, 2018
Intercoms are certainly increasing in popularity, driven by the integration of video and IP networking. But who is the favorite? On the one side,...
Vivotek 4MP Camera Tested (FD8379-HV) on Sep 13, 2018
Next in our series of updated 4MP testing, we bought and tested Vivotek's FD8379-HV, and entry level 4MP model claiming "top-notch quality video in...
Ascent / MONI Faces Lender Lawsuit and Debt Crisis on Sep 13, 2018
ASCMA, aka Ascent, aka Brinks Home Security, aka MONI, aka Monitronics is being sued by a group of their lenders who allege: As of June 30,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact