An Image Sensor Aims to Secure Security Cameras

OmniVision’s new imaging sensor is the first to embed an invisible watermark on its images, but it may not be enough to prevent spoofing

3 min read
Close up of a security camera
Getty Images

Last week, digital imaging outfit OmniVision announced the release of a new sensor chip, the first to imprint a secret watermark onto its images. The sensor, which features high resolution and wide field of view, is designed for use in security cameras. Just like watermarks on currency, a digital watermark is meant to certify the authenticity of an image or a video. However, it remains to be seen whether the new chip will be enough to reliably certify the authenticity of digital media in an era of misinformation and deepfakes.

Unlike previous digital watermarking attempts from the early 2000s, which put a visible time stamp or other metadata on a banner at the corner of the image, OmniVision’s watermark does not alter the image or video in any human-perceptible way. Instead, a secret message is embedded in randomly selected bits of the raw camera data. The bits are selected anew for each image or video frame, and the responsible circuitry is embedded on-chip. The watermark remains hidden, but preserved, even after compression to jpeg, mp4, or other formats.

“Based on our implementation, even after you do all this processing, the watermarking stays with your content, but you will not be able to see it,” says Devang Patel, emerging segment manager at California-based OmniVision.

To verify the watermark, either OmniVision, a camera manufacturer, or the owner of the camera would have to run a proprietary extraction algorithm. The algorithm extracts the embedded 32 bytes of secret information, which could contain the date and time, user or manufacturer information, or any other message. Ideally, this could be used to certify the authenticity of the media and even make it admissible as evidence in a court of law. We reached out to OmniVision’s largest competitors, Sony and Samsung, for comment and did not receive a reply.

Keeping the watermark hidden has several advantages, says Patel. First, the entire original image is preserved, so there is no risk of important content getting blocked by the watermark. This is especially important for security cameras, where the action could happen in any corner of the screen. Second, since the watermark is difficult to detect it is also difficult to reverse engineer and tamper with.

The top two images show a photo of a boat. They look the same, though one is labeled original raw, and one watermarked raw. Below is a network of blue , black and red dots. The red dots show the embedded watermark.OmniVision’s new sensor chip embeds a digital watermark into the raw camera data that is undetectable to the human eye. An extraction algorithm ran on the final image reveals a pattern of red dots, comprising the watermark.OmniVision

Difficult, but likely not impossible, says Hany Farid, a professor of electrical engineering and computer sciences at the University of California, Berkeley, and digital-image forensics expert. “We have been trying to do digital watermarking for decades,” Farid says. “But the problem is when you put something into an image or video, you can also take it out. So it's going to be vulnerable.”

Farid agrees that the correct approach to battling altered or fabricated content is for the producers—such as photographers and videographers—to certify authenticity, rather than for end users (like social-media scrollers and YouTube viewers) to attempt to detect fraud after the fact. Farid sits on the steering committee of the Coalition for Content Provenance and Authenticity (C2PA), an Adobe-led group aimed at combating misleading information online. He’s also on the advisory board of Truepic, a photo- and video-verification company.

Earlier this year, C2PA released the first technical standard for authenticating the source of media content. Unlike watermarking, C2PA’s standard doesn’t embed the metadata in the image itself. Instead, the metadata is packaged together with the image and cryptographically signed. The digital signature is recorded on a ledger, blockchain or otherwise. Any modifications or edits to the image are documented, re-signed, and added to the ledger. That way anybody looking to verify an image has access to its full history. This standard has yet to be adopted by large media creators and distributors.

Just as currency has more than one security feature, digital content can benefit from all the security it can get. “I think all of these technologies are useful,” Farid says. “I like solutions that come at it from multiple directions.”

The Conversation (0)

Europe Expands Virtual Borders To Thwart Migrants

Our investigation reveals that Europe is turning to remote sensing to detect seafaring migrants so African countries can pull them back

14 min read
A photo of a number of people sitting in a inflatable boat on the water with a patrol ship in the background.

Migrants in a dinghy accompanied by a Frontex vessel at the village of Skala Sikaminias, on the Greek island of Lesbos, after crossing the Aegean sea from Turkey, on 28 February 2020.

ASSOCIATED PRESS

It was after midnight in the Maltese search-and-rescue zone of the Mediterranean when a rubber boat originating from Libya carrying dozens of migrants encountered a hulking cargo ship from Madeira and a European military aircraft. The ship’s captain stopped the engines, and the aircraft flashed its lights at the rubber boat. But neither the ship nor the aircraft came to the rescue. Instead, Maltese authorities told the ship’s captain to wait for vessels from Malta to pick up the migrants. By the time those boats arrived, three migrants had drowned trying to swim to the idle ship.

The private, Malta-based vessels picked up the survivors, steamed about 237 kilometers south, and handed over the migrants to authorities in Libya, which was and is in the midst of a civil war, rather than return to Malta, 160 km away. Five more migrants died on the southward journey. By delivering the migrants there, the masters of the Maltese vessels, and perhaps the European rescue authorities involved, may have violated the international law of the sea, which requires ship masters to return people they rescue to a safe port. Instead, migrants returned to Libya over the last decade have reported enslavement, physical abuse, extortion, and murders while they try to cross the Mediterranean.

If it were legal to deliver rescued migrants to Libya, it would be as cheap as sending rescue boats a few extra kilometers south instead of east. But over the last few years, Europe’s maritime military patrols have conducted fewer and fewer sea rescue operations, while adding crewed and uncrewed aerial patrols and investing in remote-sensing technology to create expanded virtual borders to stop migrants before they get near a physical border.

Keep Reading ↓Show less
{"imageShortcodeIds":["29177566"]}