A Study on Data Management Using Mobile Computing With Digital Watermark Technology Manabu Hirakawa†,
Junichi Iijima‡
2
Abstract---The Internet user population has experienced explosive growth with the spread of broadband communication. This growth has caused the use of large amounts of high quality digital content to increase. Digital content has the characteristic that its quality does not deteriorate even if the content is duplicated, and digital content is also easy to handle. On the other hand, the fact that the quality does not deteriorate also introduces the risk that digital content can be easily duplicated illegally. Currently, RFID and QR codes are attracting attention as new technologies for data management. However, these technologies have a problem from the point of view of safety management, security, and their high cost of introduction. To overcome these problems, we consider a management method that uses a digital watermarking technology, and propose a management model for that method. This paper also introduces comparisons with the existing methods and their characteristics. Index Terms—Security, Digital watermark, Data management
created and modified digitally. This process yields electronic data, such as electronic documents, images, and video, from those transactions and services. In such situations, it is important to preserve the reliability of the electronic data and documents by assuring that the content cannot be altered. Given this background, it is necessary to investigate a method to resolve these problems and construct a system solution with the objective of enabling the stable development of content-based businesses, in which it is essential to have a copyright clearance system with tight information security that uses encryption and digital watermarking technologies. This paper focuses on the relation between data management and strong security, and considers a management method which uses digital watermarking technology. These two concepts are not independent of each other, but are rather closely interrelated. In recent years, RFID3 and QR codes4 have been used as data management methods, and we will compare them with the characteristics of the proposed technology.
I. INTRODUCTION Recently, the influence of digitization has spread from B2B to consumer-oriented businesses, the core of which is the use of information technology. A typical form of this is the sale of multimedia content over the Internet. In addition to the distribution of digitized music, a wide variety of content-based businesses have now been established. Digital content is used in a wide variety of businesses, for example, in DVD and CD media. Many types of digital content are distributed over the Internet and are used in web pages, digital catalogs are used in e-business, in video games, in electronic maps, and in terrestrial digital broadcasting. Content-based business models are changing along with advances in digital technology.
Fig.1. Example of QR code
Fig.2. Example of RFID Card
1
With the advent of digital technology, problems involving digital content, such as rampant media piracy and copyright infringement, have come into the open. This is becoming a huge problem when trying to make digital content-based businesses viable. With the popularization of the Internet and the growth of e-business and e-government services, various recorded data and documents for transactions and services are 1 Manabu Hirakawa , KDDI Technology Corporation. 17F Shinagawa East One Tower, 2-16-1, Konan Minato-ku, Tokyo 108-0075, Japan (
[email protected]) Junichi Iijima, The Department of Industrial Engineering and Management, Tokyo Institute of Technology2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, Japan (
[email protected])
978-1-4244-3662-0/09/$25.00 ©2009 IEEE
II. DIGITAL WATERMARKING TECHNOLOGY There are great expectations for business opportunities centered on digital content in this Internet age. However, this exposes susceptibility to unauthorized copying. For the solid growth of the promising digital content industry, a content protection technology is necessary, which will be the used as the mechanism to protect copyright holders and their content. Content protection technology is an all-inclusive concept which involves the prevention and deterrence of unauthorized copying 3
4
186
Radio-Frequency IDentification. RFID is an automatic identification method. Quick Response code. QR Code is a matrix code (or two-dimensional bar code).
of content and copyright protection technologies. Digital watermarking is an example of an effective content protection technology. Digital watermarking technology development began around 1995, and its full-fledged application began around 1998. Digital watermarking places an imperceptible mark that identifies the copyright holder into the digital content itself. In the event that the content is copied, the mark can be used as evidence for tracking. Digital watermarking does not prevent unauthorized copying. However, it can be applied broadly, and it is effective in enforcing copyright. Digital watermarking is a technology that embeds information which cannot be detected by the human eye into a digitized image. By using the redundancy in digital images to slightly change the values of the pixels across the image, data that the user cannot normally see can be stored in the image in addition to the usual image data.
Code : 0001 ID : abcde Date : Jan 01 2009
Original contents
Information
Contents with information
Y pixel/inch High durability to clipping High reliability by two or more tile collation X pixel/inch
Fig.5. Improvement of accuracy
The accuracy of the data, which is expressed over a constant area, is improved by checking multiple tiles at the time of detection. This method, which manipulates particular pixels, is called pixel substitution. Digital watermarking uses the characteristics of perceptual illusions in human vision, the fact that sensitivity is reduced though other conditions, and the redundancy of the carrier. There are three types of static images: black and white images (binary images), grayscale images, and color images. Each pixel in the image data normally consists of 8 bits. The “bit plane” refers to where the color components have been divided at the bit level. There are 8 bit planes in grayscale images. Color images are expressed by combining 8 bit planes for each of the red, green, and blue planes or the cyan, magenta, yellow, and black planes. Analyzing the bit plane of the image reveals that there are both planes which prominently reflect the characteristics of the image and ones that do not. By manipulating those planes, it is possible to embed data into the image without affecting the image quality.
Fig.3. Burial of information
This data is directly embedded into the image, and therefore it has the characteristic feature that it cannot be removed even if the image is compressed, formatted, modified, cut, or printed. This makes the automatic discovery of unauthorized copies of an image file among the enormous quantities of images on the Internet possible by embedding the image ID, the copyright holder's name, or other conditions into the image. In addition, by proactively communicating to users that this feature is in use, it will act as deterrence to unauthorized use. Digital watermarks embed information by writing over the image data at pixel level. The data for the digitally watermarked image, which has been overwritten at pixel level by using a particular algorithm, is formed over a constant area. It is not possible to visually recognize a modification in an image that has had only one pixel overwritten. However, data that shows with certainty that the image has been modified is in fact contained within the image.
Fig.4. Rewriting of pixel
It is possible to detect the information from even one portion of the image since the X×Y data description units are arranged in a continuously tiled pattern. Also, even if divided into different areas, the data can still be acquired by combining multiple data blocks.
978-1-4244-3662-0/09/$25.00 ©2009 IEEE
Fig.6. Multi layer image
III. EXISTING PROBLEM Data management is performed by using a laser to burn a digital watermark into raw materials such as iron, aluminum, stainless steel, and plastic, and then reading the marking from the reader. The read data is linked to a database, after which management, acceptance examinations, sorting, and distribution can be monitored. An encryption algorithm protects the marking itself, and user authentication and alteration prevention are considered. In recent years, there have been many cases where QR codes and RFID technology have been introduced as new technologies for distribution management. In this paper we compared QR and RFID codes and digital watermarking technology. The items that were compared are as follows: 1) The raw material processing and age degradation: Heat resistance, Waterproofing properties 2) The degrees of freedom of the markings: Minimum required area, The degrees of freedom for the shape 3) Security:
187
Confidentiality, Obfuscation against Obfuscation against alteration 4) Reading: Ease of reading 5) Cost Cost, Compatibility with reading devices
duplication,
The results of the technical comparisons of the above items are as follows: Table I. COMPARISON OF EACH TECHNOLOGY Watermark QR Code Heat Resistance ○ △ Waterproof ○ △ Minimun Required Area ○ × Degrees of freedom ○ × Confidentiality ○ × Obfuscation against duplication ○ × Obfuscation against alteration ○ × Ease of Reading △ △ Cost ○ ○ Reading Device △ ○
RFID × × △ △ △ ○ ○ ○ × ○
In terms of the raw materials during the processing stage and in the usage environment, RFID has inferior heat resistance. RFID uses RF tags to perform wireless communication. RFID can be constructed from multiple elements on a circuit board, or can be implemented on a single chip, both of which are prone to destruction by heat. Although the impact of heat is reduced in QR codes as compared to RFID, the means of preserving the print condition of the markings becomes a challenge. In digital watermarking, a laser directly burns the markings into the raw materials, and therefore it has heat resistance and waterproof properties that are superior to those of the traditional technologies. Next, with regard to the degree of freedom of the markings and the reading environment, QE codes have more restrictions. QR codes have between 21×21 cells in version 1 and 177×177 cells in version 40. The required minimum area is determined by the amount of data embedded and the reading resolution. If the area of the managed materials is greater than the minimum area of the QR code, there is no problem, while if it is less, it is not possible to mount the markings. Also, reading might not be possible if the managed material is curved in the shape of a bar or a sphere (error correction is performed to improve the reading rate). RFID is strong with regard to this point: if it is possible to mount the RF Tag, then recognition is certain. Marking for digital watermarking is performed in accordance to the shape, as a result of which the markings have a high degree of freedom, and reading can be performed easily regardless of the shape.
The benefit of RFID is that it can ensure non-contact recognition by using wireless communication. However, there is a problem because it is possible that RFID reader eavesdropping can be performed from an unintended location. In terms of cost, RFID requires that RF tags be installed in all of the target objects. Although the cost is currently lower than 10 yen per RF tag, when the number of target objects is great, this amounts to a cost that cannot be ignored. In QR codes and digital watermarking, the cost can be controlled relatively well since the markings are constructed by using printing or burning. One challenge for digital watermarking is its compatibility with reading devices. Although specialized terminals are used as readers the current stage of development, the range of usability should be increased in the future by using readers for conventional PCs and mobile terminals. IV. SOLUTION 5
DPM is a method in which markings are made directly onto a product itself. A characteristic of this research project is that it uses digital watermarking using DPM. One characteristic of DPM is that, because the markings are made directly onto the material, there is no need to worry that the markings might peel off like an adhesive label. Markings made using DPM can be used in harsh environments and deterioration of the markings is slow, so they can be used over a long period of time. In this research project, digital watermarking information was applied using the following three types of DPM and then verified. A. Printing method (inkjet method) In this method, just as with a common printer, printing is done by spraying ink. Printing can be done directly onto metals, plastics, or glass. It is possible to achieve high-quality printing at a low cost and with a consistent density. However, the ink may blot depending on the material, and it is difficult to maintain the quality over long periods of time. B. Engraving method (dot pin marking method) Using the dot pin method to engrave information onto materials, it is possible to directly print onto metals, molds, printed-circuit boards, plastics, and glass. Deep markings can be made in large metallic products; however, since this method uses dot pins to strike the surface and make marks, it has the problem that the cell size is larger than the cell size in a laser marking method.
There are many security concerns with QR codes. QR codes are compatible with reading devices such as specialized readers and cell phone terminals, and are the most common of these three technologies. However, they are weak in terms of confidentiality and obfuscation against alteration.
978-1-4244-3662-0/09/$25.00 ©2009 IEEE
Fig.7. Example of engraving method 5
Direct Part Marking. Direct Part Marking is a process to permanently mark parts with a barcode.
188
C. Laser marking method The principle of the laser marking method is that a laser is used to carve the surface of a material causing a diffused reflection to show contrast. (There are other methods that alter the color of materials to show contrast, or to remove the coating on the surface of the material.) The laser marking method has the characteristics that it is not easily removed or altered, and it can maintain high-quality printing in harsh environments for long periods of time with little deterioration. It is possible to directly print onto metals, printed-circuit boards, plastics, and glass. Laser marking can be done with different types of lasers, such as CO2 lasers or YAG lasers. The YAG laser wavelength is 1.06 μm and it can print markings on a wide variety of materials including metals and plastics. The CO2 laser wavelength is 10.6 μm. Because the amount of heat transfer to the metallic surfaces is small, it is not appropriate for marking metals. However, it is good for marking glass or printed-circuit boards, and cheap when compared to YAG laser.
V. APPLICATION TO DATA MANAGEMENT New data management and business schemes can be constructed by using the previously mentioned digital watermarking. Digital watermarking technology was originally used to enforce copyright and for certifying originality. However, new business models have been established using this base technology. In one example, the application of DRM6 technology to the design of brand name products allows for legitimate product authentication and makes it possible to identify the distribution route. Also, directions to the website of the relevant brands can also be added.
Fig.9. Example of detecting unauthorized copying goods
Fig.8. Example of laser marking method
According to the previously mentioned comparison results of the basic principles of digital watermarking with the conventional technology, reliable data management can be performed when the methods mentioned above are used.
The following example applies DRM technology to the coating and parts of a car. By recording the car data, which is unalterable by the user, DRM can be used as a theft detection and crime-prevention measure. In addition, services can be provided, such as promotions with information about new car models from the car manufacturer, or the current market price for used cars.
The following are the main three points for data management from this research: 1) Determining the embedded data: embedded data contents (data volume) 2) Investigating the processing method: Building into a processing machine 3) Read investigation: Building into a read device The amount of data that can be embedded is determined by the surface area (within the readable surface area) of the raw materials and other materials, and the resolution at which information detection is possible. It also depends on the precision of the device that can create the readable markings. If the markings can be printed or burned with a high resolution within a given area, it will be a factor that can reduce the required surface area.
Fig.10. Example of theft detection
These markings can be used in the manufacturing industry for embedding a unique ID or lot numbers into metallic parts for the purpose of automobile detection and accident prevention. Additionally, a system that confirms distribution routes with absolute certainty can be designed, which can also be applied to other fields by embedding them into medical equipment (e.g., knives or scissors) and managing them by using a database, and thus equipment that needs a lease renewal 6
978-1-4244-3662-0/09/$25.00 ©2009 IEEE
189
Digital Rights Management. DRM is a term that refers to access control technologies.
or quantity check can be managed.
Also, by using the information added to the parts, during the manufacturing stage, confirmation that mounting is being performed precisely in accordance to regulations can be issued automatically. Also, it aids accident prevention in the manufacturing stage as well.
Fig.11. Management of medical equipment
VI. CONCLUSIONS Digital watermarking technology is a technology which embeds additional data that cannot be detected by the human eye into digital data. Hidden data that cannot be seen by the common user can be inserted in addition to the regular data by using the redundancy in digital data and slightly changing the values of the elements that make up the data across the entire image.
Fig.14. Use to substrate
Currently, there are no examples of digital watermarking information used on anything other than digital content data and paper media. The information itself is burned into the material, and therefore it has the benefit of having strong resistance to heat and water. The characteristics of digital watermarking are as follows. 4) Using a cellular phone as a reading terminal Since it is costly to develop specialized reading terminals, we use a cellular phone as a reading terminal. The camera function resolution is high and the development of reading applications is easy, and therefore we expect that this should reduce the cost of development.
Fig.15. Use to screw of metal
For stable data management with digitization, a copyright clearance system with tight information security using digital watermarking technology is needed. In addition, in this advanced information society, ethics regarding information handling must be clarified and extensive education and development must be conducted. VII. FUTURE WORKS
Fig.12. Reading Terminal
5) Incorporation of the database system into the network By linking the read data with a database over a network, the information can be managed in real time.
Fig.13. Example of database system into the network
6) Using tracking in manufacturing and the distribution process Digital watermarking can be used for tracking the distribution process by embedding digital watermark information regarding the product or lot numbers into the parts.
978-1-4244-3662-0/09/$25.00 ©2009 IEEE
Future challenges include: suppressing the visibility of the marking in each material, investigating methods for evaluating the condition of the markings, and expanding the number of reading devices. 1) Categorization of service models for service configurations that will be used. 2) Construction of a system model that allows for sound operation. 3) Establishment of evaluation standards with the objective of optimization. 4) Attack resistance verification. 5) Standardization of basic components and tools. REFERENCES [1] [2]
190
Tsukasa Ono, “Digital watermark and contents protection”(In Japanese), Ohmsha, Ltd.., 2001 Scott Moskowitz, “Digital watermark. -The technically, economically, legally, code, and logical side-”, Serendip Publishing Co.,Ltd., 1999
[3]
Kineo Matsui, “Base of digital watermark”(In Japanese), Morikita Publishing Co.,Ltd., 1998 [4] Ryoichi Sasaki , Hiroshi Yoshiura , Satoru Tetsuka , Hisanori Mishima, “Information security of days of the Internet. -Code and digital watermark.-”(In Japanese), Kyoritsu Publishing Co.,Ltd., 2000 [5] Akira Inoue, “Digital watermark - Encryption system at multimedia era-”(In Japanese), Maruyama art and science books, 1997 [6] Frank Hartung, “Digital Right Management and Watermarking of Multimedia Content for M-Commerce Applications”, IEEE Communications Magazine, pp.78-84, 2000 [7] Martin Steinebach, Enrico Hauer, Patrick Wolf, “Efficient Watermarking Strategies”, AXMEDIS '07. Third International Conference, pp.65-71, 2007 [8] Internet Association Japan, “The Internet white paper”(In Japanese), http://www.iajapan.org/iwp/ [9] Electronic information technology and synthesis committee, “Investigation report concerning electronic watermark”(In Japanese), http://it.jeita.or.jp/eltech/report/2001/01-jou-04.html [10] Wikipedia, http://en.wikipedia.org/
BIOGRAPHIES Manabu Hirakawa is a Doctor Candidate at the Graduate School of Decision Science and Technology, Tokyo Institute of Technology. He received a Master of Business Information Technology degree in 2008 from the Department of Innovation Management, Hosei University graduate school, Tokyo, Japan. His research interests include Security, Digital watermark and Systems of Information Technology. Junichi Iijima is a professor at the Graduate School of Decision Science and Technology, Tokyo Institute of Technology. He received a Doctor of Engineering degree in 1982 from the Interdisciplinary Graduate School of Science and Engineering, Tokyo Institute of Technology, Tokyo, Japan. His major interests are Systems Theory, Business Process Modeling, Information Systems Integration, IT Investment and Management and Data Mining.
978-1-4244-3662-0/09/$25.00 ©2009 IEEE
191