Académique Documents
Professionnel Documents
Culture Documents
DIGITAL
WATERMARKS AS
LEGAL EVIDENCE By Maurice Schellekens1
Digital watermarks allow the invisible and indelible appropriately. This article investigates whether
incorporation of information in an item of intellectual information deduced from digital watermarks could
property, such as a digital picture or a digital movie. and should be used as evidence in legal proceedings.
Digital watermarks can be used for the detection of In particular, it will focus on the limitations that the
copyright infringement. This article considers one right to privacy and the science underlying digital
particular application of digital watermarks: tracing watermarks should impose. The focus will be on
the source of an illegal distribution. The evidential Dutch law.
value of digital watermarks is considered. The article In the following section of this article, the aims and
identifies areas of concern with respect to the context of the use of watermarks for copyright
legality of proof and with respect to the scientific infringement protection purposes is explained. The
aspects of proof by digital watermark. The article third section analyses the legal issues arising when
concludes with a few wider considerations using watermarks for evidentiary purposes. Issues
concerning the use of digital watermarks for the concerning reliability, legality and scientific validity of
purposes of enforcing intellectual property rights. digital watermarks will be addressed. The fourth
section analyses how contract law can be used to
Introduction diminish the evidentiary risks associated with the use
A digital watermark is meta- information that can be of watermarks and the limitations that watermarks
added to a work such as a picture or a movie. The impose in this context. Finally, the wider implications
watermark is imperceptible to the user of the work of the use of digital watermarks will be addressed,
and is difficult to alter or remove. Digital both for users of watermarked works, and for the
watermarking technology can be used for a range of enforcement of copyright.
legal applications, including copyright protection. In
this context, the technology could be put to a number The context of copyright infringement
of uses, such as watermarks that identify the author protection
or rights holder, or watermarks that carry information Although the use of digital watermarks for copyright
identifying the work, which could be used by playing infringement protection purposes may take place in
devices, or by Internet Service Providers (ISP) for the many different contexts, one such context the movie
purpose of recognizing copyrighted materials. This industry will be described here to set the scene for
article will not address these applications, but understanding watermarking as a means for copyright
focuses on a particular application of digital infringement protection. The movie industry has an
watermarks, that of tracing the source of an illegal elaborate business model for bringing movies to the
work. It functions like this: a watermarked work is market and to increase the revenue that a movie
given to a limited number of licensees, for example yields. Although the exact business model may differ
movie theatres. After a while the work might appear from production company to production company and
on the internet without permission of the rights even between movies, a typical business model is
holder. With the help of the digital watermark in the provided. A new movie is first circulated among a
internet-copy of the work, it is relatively easy to number of reviewers who write comments on the
retrieve the code that indicates which of the licensees movie and publish them in widely read periodicals
might be responsible for failing to secure the movie and internet sites. The production companies hope
1 This article has been written as part of the DaVinci Department of Electronics and Informatics (ETRO) indebted to professor Ann Dooms for the valuable
project, a collaboration between VUB/ETRO and of the Faculty of Engineering Sciences in Brussels, comments she provided to an earlier draft of this
the Tilburg Institute for Law, Technology, and a mathematical approach to lattice based text.
Society, funded by IBBT and ICTRegie. At the watermarks is being developed. The author is
152 Digital Evidence and Electronic Signature Law Review, Vol 8 Pario Communications Limited, 2011
DIGITAL WATERMARKS AS LEGAL EVIDENCE
that these reviews whet the appetite of the public to may also want to pursue any legal remedies in this
go and see the movie. When the movie is released to respect.
the public at large this is done exclusively in the The traditional way of identifying the source of the
profitable market of the movie theatres. The movie is illegal version of the copyrighted material is to
later released on DVD for the rental market, such as identify the person who placed a work on the internet,
hotels or airline companies. When this market is and request a court to order the defendant or the
saturated, the movie is licensed for broadcasting on person suspected of uploading the infringing work to
television or the internet. The business model is make known his predecessor from which he obtained
disturbed if pirated copies of a movie appear on the the infringing materials (compare article 1019f Dutch
internet, especially if it happens in the earlier stages Code of Civil Procedure DCCivP).2 This process can
of the exploitation of the movie. Therefore, most be a burden, because it might take some time before
production companies take measures against pirated the rights holder identifies the person responsible for
movies appearing on the internet. The traditional the breach.
response is to take action against the person that Digital watermarking provides an easier way to
placed the content on the internet or the ISP that identify the source of the breach. Upon distribution,
hosts the movie file. Typically, enforcement focuses on each copy is digitally watermarked with a copyright
the links in the illegal distribution chain. It may, infringement protection code. Each licensee obtains a
however, be more efficient to try and prevent the copy with a unique watermark that identifies him as
illegal distribution at the source, such as the reviewer the licensee. In this way, it is possible to detect the
who leaked the movie to the internet or the movie relevant licensee quickly, once a pirated and
theatre that may not have done enough to stop watermarked copy has been discovered on the
members of the public from recording the movie in the internet. Identification of the licensee by
theatre. In general, the source is the person or entity watermarking fulfills a pressing need, especially if
within the limited circle that rightfully has a copy at other methods of identification, such as following the
its disposal and whose copy somehow finds its way to links of the chain, are impossible or uneconomical.
an illegitimate distribution channel. Mere identification of the licensee is one step. If
One reason for the rights holder to identify the measures are to be taken against the licensee and the
source is to enable him to investigate whether the licensee is not willing to comply, it is relevant to know
licensee has done enough to prevent the work from whether the detection by watermark provides
being distributed without authority. If the security adequate evidence of the identity of the licensee.
measures in place are not sufficient, the rights holder Although a degree of certainty about the identity of
may be able to take measures to prevent a leak from the registered licensee does not indicate what role, if
occurring again, such as future exclusion of the any, he or she played in failing to control the
licensee or requiring the licensee to implement intellectual property, it is an important first step in
improved measures against leaks. The rights holder building a case to take further measures. Either the
may also want to recoup damages from the licensee. watermark and the infrastructure in which it is
The behaviour of the licensee may also constitute included provide direct legal proof of the identity of
indirect copyright infringement or breach of contract. the licensee, or based on the detection of the
It might be that the licensee or their employee watermark, further legal measures can be taken to
engaged in criminal behaviour, such as aiding and arrive at a proof of the identity of the licensee. An
abetting copyright infringement. The rights holder example of the latter is the preliminary witness
2 Article 1019f DCCivP is the Dutch implementation commercial scale; (b) was found to be using the goods or services in question. 3. Paragraphs 1 and
of article 8 Directive 2004/48/EC of the European infringing services on a commercial scale; (c) was 2 shall apply without prejudice to other statutory
Parliament and of the Council of 29 April 2004 on found to be providing on a commercial scale provisions which: (a) grant the rightholder rights
the enforcement of intellectual property rights OJ L services used in infringing activities; or (d) was to receive fuller information; (b) govern the use in
157, 30.4.2004 and OJ L 195, 02/06/2004 p. 16 indicated by the person referred to in point (a), (b) civil or criminal proceedings of the information
25: Right of information 1. Member States shall or (c) as being involved in the production, communicated pursuant to this Article; (c) govern
ensure that, in the context of proceedings manufacture or distribution of the goods or the responsibility for misuse of the right of
concerning an infringement of an intellectual provision of the services. 2. The information information; or (d) afford an opportunity for
property right and in response to a justified and referred to in paragraph 1 shall, as appropriate, refusing to provide information which would force
proportionate request of the claimant, the comprise: (a) the names and addresses of the the person referred to in paragraph 1 to admit to
competent judicial authorities may order that producers, manufacturers, distributors, suppliers his/her own participation or that of his/her close
information on the origin and distribution and other previous holders of the goods or relatives in an infringement of an intellectual
networks of the goods or services which infringe services, as well as the intended wholesalers and property right; or (e) govern the protection of
an intellectual property right be provided by the retailers; (b) information on the quantities confidentiality of information sources or the
infringer and/or any other person who: (a) was produced, manufactured, delivered, received or processing of personal data.
found in possession of the infringing goods on a ordered, as well as the price obtained for the
Pario Communications Limited, 2011 Digital Evidence and Electronic Signature Law Review, Vol 8 153
DIGITAL WATERMARKS AS LEGAL EVIDENCE
3 For an additional discussion on Dutch law relating Netherlands in Stephen Mason, general editor,
to electronic evidence, see Dr. Simone van der Hof, International Electronic Evidence (British Institute
Rno Pijnen and Simone Fennell-van Esch, The of International and Comparative Law, 2008).
154 Digital Evidence and Electronic Signature Law Review, Vol 8 Pario Communications Limited, 2011
DIGITAL WATERMARKS AS LEGAL EVIDENCE
1. Whether the item in question was actually found the evidence. Such an agreement can resolve many of
on the internet. the uncertainties that exist under the statutory law of
evidence. Agreements about evidence only affect the
2. The entire process of affixing, registering and parties privy to the agreement and only in civil
detecting digital watermarks was not executed proceedings. These agreements will be dealt with below.
with the required care and attention and therefore
the watermark is unreliable as evidence. Legality of the evidence
The legality of the evidence can be disputed in
3. The integrity of the database containing the various ways:
registrations of affixed watermarks is
1. The evidence was obtained using a covert means
compromised so that the mapping from
(possibly) infringing human rights such as privacy.
watermark to identity has become unreliable (for
instance as a consequence of criminals hacking
2. Personal identifying information was registered
into the database).
at a moment that no suspicion of infringement
existed, thus infringing privacy or data
4. A licensee did not enrol under his own name.
protection rules.
Hence, the data in the watermark is not
necessarily sufficient to establish his or her
3. The combination of watermarking, registration
identity.
and detection gave insight to patterns of
communication or information such that it
Whether these contentions are successful depends on impinged upon the unencumbered exercise of the
the extent to which the defendant can corroborate freedom of expression as meant in article 10
them with additional facts. The contentions can ECHR. Basically, it is contended that the evidence
largely be preempted if the rights holder takes was gathered or presented in an unlawful way
adequate measures beforehand. Such measures can and that this unlawfulness should be a reason to
include a combination of technical (firewall and virus apply the exclusionary rule, that is to disallow
protection of the database), procedural (identity the evidence.
checks at enrollment, procedures for registration of
what picture was found where, when and by whom, Two questions arise. First, it is necessary to know the
safe storage of retrieved pictures, watermark conditions by which evidence was unlawfully
detection in a safe environment, providing for obtained. Second, if evidence was obtained
possibilities for contra-examination) and institutional unlawfully, whether it should it be excluded.
measures (outsourcing watermarking and detection to With respect to whether the evidence can lawfully
a third party). Where doubts continue to be raised be admitted, criminal and civil law differ. In criminal
with respect to the reliability of the evidence, even law, the gathering and presentation of evidence is
where it is proved that the rights holder took such subject to the legality principle: the police and judicial
measures, it will be for the court to decide whether it authorities may only exercise powers that infringe
shares the doubts and if so, whether they make the upon human rights if they have been statutorily
evidence unusable. When rendering its decision, a granted to them.4 In defining the powers and the
court will look critically at the credibility of the doubts conditions under which they may be used, the
in view of the measures taken to safeguard the legislator balances the benefits of exercising the
reliability of the evidence. In any event, the court is power against the infringement of human rights such
free to assess the evidence before it and to attach the as privacy. Evidence gathered without an adequate
value to it that it sees fit. The party relying on the legal basis infringes privacy and is basically unlawful.
watermark may try to reach an agreement with the Other reasons for excluding evidence in criminal
licensee about the evidence in order to deal with any proceedings may be that, where there is a statutory
uncertainty relating to the courts discretion to assess power, the required formalities have not been
Pario Communications Limited, 2011 Digital Evidence and Electronic Signature Law Review, Vol 8 155
DIGITAL WATERMARKS AS LEGAL EVIDENCE
complied with or even if the formalities have been may refer to a legal entity, such as distribution
complied with, the exercise of the power may be companies, or to individuals. In the former case, the
disproportionate, in that no reasonable relation may identifying details of the company are registered. It is
exist between the costs of the exercise of the power assumed that this does not raise a privacy problem. In
and the purpose that is to be attained by it. case individuals (such as reviewers) are being
In civil law, the parties to the action gather the registered, the question of privacy is self-evidently
evidence. The gathering of evidence may not breach relevant.
statutory rules, may not infringe upon subjective For the purposes of analysis in relation to privacy, it
rights or may not lack due care. Providing evidence is important to discern four stages of the watermark
has been obtained lawfully, all methods may be used process:
to collect evidence.
The actions of private persons are not governed by 1. Affixing the watermark to the intellectual property.
the legality principle. If watermark based evidence This is the necessary preparatory act required to
gathered by civilians is later used in criminal make it possible to trace the person responsible
proceedings against an infringer, the gathering of for breaching copyright later on in the process.
evidence is mostly judged against civil standards. This
does not hold if the police actively solicit the 2. The presence of the watermark in the intellectual
gathering of civil evidence in order to evade the property. At this stage, it is relevant that people
constraints of public law. The use of digital without authority do not obtain access to the data
watermarks for the purpose of enforcing intellectual in the watermark. In essence, there are two
property rights will mainly be used in a civilian options in respect of the information to be
setting. To the authors knowledge, there are no included in the watermark: the watermark
public policy documents in which watermarking is comprises data that directly identifies a person or
seen as a task for government. The failure to gather legal entity, such as name, address and dwelling
evidence lawfully is dealt with according to civil place are placed in the watermark, or an
standards. If publicly funded institutions such as indentifying code is inserted that in itself carries
museums or archives use watermarking, they are not no information about the registered licensee. The
subject to the legality principle. This is not seen as first option requires the watermark to be
exercising a typically public function, but merely as encrypted in order to prevent unauthorized access
enforcement of their civil interests. to the information it contains. It is possible to
In practice, a breach of privacy is the most prevalent encrypt the watermark only, while the rest of the
reason for the evidence to be refused admission into picture is not encrypted.5 The latter option
proceedings. For this reason, the discussion is requires the user of the watermark to maintain a
restricted to whether watermarks could infringe database that enables the code to correspond to
privacy. The privacy implications are dependent upon a physical identity. It is necessary for the
the way in which copyright infringement protection is database to be secured against unauthorized
implemented using watermarks. access.
As a preliminary issue, it is relevant to know who or
what is being registered as a licensee. A watermark 3. Reading the watermark. This is relevant because it
156 Digital Evidence and Electronic Signature Law Review, Vol 8 Pario Communications Limited, 2011
DIGITAL WATERMARKS AS LEGAL EVIDENCE
Pario Communications Limited, 2011 Digital Evidence and Electronic Signature Law Review, Vol 8 157
DIGITAL WATERMARKS AS LEGAL EVIDENCE
latter implementation is more elaborate, it may have licensee. The item of intellectual property may even
an advantage in terms of the amount of data included have left the possession of the rightful licensee
in the watermark. An identification code is more involuntarily, perhaps because his computer was
compact than a reference to the attributes of a hacked. Any conclusions about the involvement of the
physical identity, and a shorter watermark is easier to registered licensee in a disclosure of the intellectual
hide in a picture or other item of intellectual property. property have to be dealt with the utmost care and
More importantly for data protection purposes, the attention. Subsequent actions towards the registered
consequences differ, depending on the approach licensee should be based on adequate information
adopted. In the first approach, the licensee becomes about the evidence, partly derived from the
the custodian of his own data. The protection of the watermark, but preferably supported by information
right holders copyright and protection of the from other sources.
licensees personal data are brought together. If the Finally, watermarking should pass the subsidiarity
licensee does not share the work for privacy reasons, test. It will be necessary to establish whether there
the right holders copyright is automatically protected. are other, less burdensome means to trace the source
The licensee must obviously be informed of the exact from which infringing materials originate. The existing
data present in the watermark; since the watermark is alternative mentioned above is to obtain court orders
imperceptible he cannot see so for himself. With this obliging infringing parties to disclose the identity of
knowledge, he can take adequate measures to protect person from whom they obtained the work, thus
the data against unauthorized access. Furthermore, it advancing one link in the chain and to repeat this until
enables him to exercise his right to correct the data, the first source in the distribution chain has been
should the data prove to be wrong. From a data reached. This method is particularly onerous, not just
protection perspective, this alternative seems to be for the user of the watermarks, but also for all
straight forward. The second option is more intermediate links in the illegal distribution chain. In
complicated from a data protection perspective. Here, the traditional way, each person and the relationship
the content provider or a third party is responsible for between each person must be identified. Digital
the personal data, and will have to take the measures watermarks bypass all the intermediate links and only
necessary to protect the data against unauthorized implicate the privacy of the source. In this respect,
access. digital watermarks are a very useful method of
In the third stage, who reads the watermark is identifying a licensee.
relevant: the user of the watermark or a trusted third In conclusion, data protection legislation does not
party (TTP). In the latter case, extra care towards the prevent the use of watermarks. It is necessary to
registered licensee can be built into the process by provide guarantees to protect the interest of the
stipulating the conditions under which the TTP may registered licensee at each stage of the watermarking
provide data to the user of the watermark. A possible process. The extent to which the user of a watermark
condition could be that the user of the watermark can has to go to protect the interests of registered
obtain access to the data where a registered licensee licensees depends on the particular circumstances of
is involved in more than one breach of the licence. In the watermarking application, such as the value of the
the absence of a TTP, the care due to the registered works, the efficiency of reducing the ability of the
licensee may be implemented in another way, such as licensee to deal with the intellectual property other
by formulating conditions for the use of the data. than in accordance with the terms of the licence, the
Finally, in the fourth stage, the use of the data could consequences attached to positive identification and
be regulated by self-imposed rules. In this instance, it the nature of the information revealed about the
is important to know that the data are being used for source through positive identification.
a purpose for which they are fit. The risk of It might be that the legitimate interest of the
misinterpretation is significant. The item of controller does not justify the processing of the data
intellectual property may have been revealed on the of licensees. This means another justification to
internet by somebody other than the registered process data must be considered. Of the justifications
158 Digital Evidence and Electronic Signature Law Review, Vol 8 Pario Communications Limited, 2011
DIGITAL WATERMARKS AS LEGAL EVIDENCE
mentioned in article 8 DDPA, consent is the most systematically, privacy infringement may have a
promising. When the registered licensee consents to structural character. Every work released with a
their data being viewed, processing the data can be watermark may be infringing privacy. In such cases, a
justified, but the DDPA is careful to regulate how court may be more inclined to set an example by
consent should be obtained. The consent should be excluding unlawful evidence. In such circumstances, it
given in such a way that any doubt that the controller is not just a single case, but the general practice by
may have about the consent is excluded. If there is the user of the watermark that is at issue. At the time
any doubt, the controller is obliged to verify whether of writing, two criminal cases in the court of Haarlem
the registered licensee has actually given their have excluded evidence that the Dutch security
consent.6 This seems to exclude that consent is services obtained through illegal interception of the
obtained through a provision included in the general telephone of a journalist.9 This indicates that the
terms and conditions that go with the license. A more possibility of applying the exclusionary rule is far from
conspicuous mention of the data processing must be purely theoretical. Another implication of privacy
made, such as through a pop-up message when infringements may be that the privacy commissioner,
agreeing to a license. Sufficient information about in the Netherlands the College Bescherming
what the registered licensee agrees to must also be Persoonsgegevens, steps in and forbids the further
made available. Another concern with respect to use of watermarks until such time as the privacy
consent is that the party using the watermark will concerns are adequately addressed. This is, however,
need to be able to prove the consent. This means that outside the realm of the law of evidence and will not
the necessary legal, technical and organizational be dealt with here.
measures must be taken to safeguard this.
Many privacy issues can be avoided if watermarks Scientific disputation
are used to register companies or institutions rather
than individual persons. Assuming that the companies A scientific disputation of the evidence may take the
are so large and the other circumstances are such that following forms:
spontaneous recognition of individual persons can be
False positives
excluded, data protection problems may not be
relevant. An example may be the case where a hotel is A defendant could claim that detection software has
registered in a watermark database instead of found a watermark in a picture that was never put into
individual hotel guests, or where a movie theater is it. Perhaps no watermark was ever placed in the
registered instead of individual visitors. picture, perhaps another watermark had been placed
in it. That this could occur by coincidence, for example
Exclusion of unlawfully obtained evidence as a consequence of compression, resizing or other
If it is not possible to prove consent, or the notice of normal processing acts, is very unlikely. The length of
registration of personal data was inadequate, or a watermark is so great that the chance that random
privacy is infringed in some other way, the evidence is changes in bits would produce something that could
considered to be unlawfully obtained, even though be recognized as a watermark is statistically
the evidence may be perfectly reliable. Where negligible. False positives through human
evidence has been improperly obtained, it is useful to intervention such as collusion are more likely.
consider whether the evidence should be excluded, or Collusion could work as follows. Suppose two
whether it can be admitted. If the evidence is licensees have the same picture, but each has a
admitted, perhaps the unlawfulness can be dealt with different watermark. Then the licensees could, by
in another way.7 Dutch civil courts have hitherto been comparing the two pictures, discover the bytes
reticent in excluding unlawfully obtained but reliable making up the watermark by finding out where the
evidence.8 However, if watermarks are being used bytes that make up their pictures differ. They could
Pario Communications Limited, 2011 Digital Evidence and Electronic Signature Law Review, Vol 8 159
DIGITAL WATERMARKS AS LEGAL EVIDENCE
then make up a third copy of the picture that is in watermarking. A watermark embedded by one
every respect the same as the two copies they already company can usually not be detected by software of
have, apart from the bytes that make up the another company.12 This means it may even be more
watermark. If they give the bytes the average value of difficult to determine whether there are any partial
the byte values found in their original pictures, watermarks that may be present in addition to the
something could be created that might be recognized one a digital evidence specialist may have been asked
as a watermark. This means that the watermarking to identify.
algorithm must make sure that no watermark is given
out that is capable of being an average of any two Authenticity of the watermark
other watermarks that have been given out. When the The watermark may be a fabrication after the fact.
number of watermarks in circulation is limited, this Given a picture, theoretically a watermarking
can easily be done, but when the number of algorithm and key could be made that reads any code
watermarked copies of the picture becomes larger from the item of intellectual property. For this reason,
this becomes increasingly difficult. it is especially important that the watermarking
techniques used are registered with a trusted third
Partial retrieval
party before handing out watermarked intellectual
By the time an item of intellectual property is property, or at least well before any conflict about the
retrieved from the internet, its watermark may have watermark arises. Only by fixing the algorithm and
been damaged. It may be that the watermark can only key before the event, can it be proven that a
be partially read.10 The problem shows some watermark found in intellectual property was actually
semblance with the use of DNA for identification placed in the work before the dispute arose. The key
purposes. Sometimes DNA found at crime scene has in this respect has the function of coding where the
deteriorated, so that only a partial profile can be watermark is located in the intellectual property. It
derived from it. This has not given rise to a question must thus be distinguished from a possible key used
of interpretation, because a forensic scientist can for encrypting the message contained in the
explain what it statically means: that, for instance watermark.
less Short Tandem Repeats (STR) are used. In other Discussion before a court about these issues
words, they can indicate the level of reliability of their involves digital evidence specialists explaining
findings. What has given rise to discussion is how to reports they prepared about an investigation into a
report partial DNA findings. In the past, a profile that marked item of intellectual property. The
was so incomplete as to be useless for positive requirements that an expert witness must meet under
identification purposes was not reported at all by the Dutch law are very general. In the Netherlands,
forensic scientist.11 Later, it proved to be important scientific expert evidence should conform to the
that the court should be made aware of the presence criteria set out in the Schoenmaker case:13
of the deteriorated DNA, since it pointed to the
presence of somebody else other than the suspect; it 1. What is the profession, the education and
may not have been fit for a positive identification, but experience of the expert?
it could still be used for the purpose of excluding the
suspect. This raises the question how digital evidence 2. Does the expertise relate to the subject on which
specialists should report about partially retrieved the expert is giving an opinion?
watermarks. The problem with digital watermarks is
even more complicated because there are many 3. What method did the expert use?
algorithms and applications available for
10 This type of problem has been investigated by 11 Rechtbank Rotterdam 27-04-2005, LJN: AT4777, This decision of the Dutch Supreme Court is not
Dieter Bardyn, Ann Dooms, Tim Dams and Peter 10/010049-04 and Gerechtshof s-Gravenhage 22- yet available from a free digital open source,
Schelkens, Comparative Study of Wavelet Based 11-2005, LJN: AU6566, 2200301205. although it has been assigned a reference
Lattice QIM Techniques and Robustness against 12 Jong-Nam Kim and Byung-Ha Ahn, MPEG number (ZD0917) in the free on-line case law
AWGN and JPEG Attacks, Proceedings of the 8th Standards and Watermarking Technologies, in collection rechtspraak.nl.
International Workshop on Digital Watermarking, Juergen Seitz, editor, Digital watermarking for
(Springer-Verlag Berlin, Heidelberg, 2009) pp digital media, (IGI Publishing, 2005), pp 182-214.
39-53. 13 HR 27 January 1998, NJ, 404. Dossier no. 106416.
160 Digital Evidence and Electronic Signature Law Review, Vol 8 Pario Communications Limited, 2011
DIGITAL WATERMARKS AS LEGAL EVIDENCE
4. What is the reliability (validity) of the method tools used for evaluation. Examples of such tools are
used? computer programs such as Stirmark,17 Checkmark,18
Optimark,19 and WET (Watermark Evaluation
5. Was the expert able to apply the method in a Testbed).20 However, the standard leaves many details
competent fashion? about the implementation of an evaluation open. For
instance, it does not prescribe in detail how to
Of the five criteria, the fourth criterion is the most perform an evaluation, nor does it provide boundary
significant in respect of digital evidence: the expert values for the parameters it distinguishes. Such
must be able to show that the method he used for details can only be given if it is known how the
arriving at his conclusions is reliable. As a watermark is applied, because only then the
consequence of the Schiedam park murder case, the characteristics of the watermark are known. The
trend in the Netherlands is to have healthy scepticism approach of indicating best practices does have the
towards the results of investigations and the science obvious advantage that the standard is reasonably
involved in obtaining them.14 It is not enough to show independent from the technology and will not easily
the findings. If necessary, the court must be able to become outdated.21 At the same time, this means that
verify the steps the expert took for arriving at his an adequate technical evaluation of, for example, the
conclusion. authenticity of a watermark retrieved from a picture
In this respect, it is important that there are found on the internet depends on the quality of the
standards that codify the shared opinion in the benchmarking programs used and the experts
scientific community to which digital evidence involved in performing the evaluation. As indicated
specialists can refer in their reports and testimonies.15 above, it is also not specifically aimed at forensic use.
In the field of digital watermarking, there have been The parties and courts that need to evaluate
several initiatives to arrive at standards, such as in recovered watermarks must therefore be critical about
the context of Copy Protection Technical Working how the best practices have been implemented. In
Group and Digital Audio-Visual Council (DAVIC). The this respect, additional work geared towards
Moving Picture Experts Group (MPEG consortium) standardisation of forensic procedures and
helped to develop a standard that has the greatest certification of benchmarks and forensic experts or
relevance in this respect, a standard about the investigation institutes would provide much needed
evaluation of persistent association technologies.16 help for courts. This does not take way the relevance
This standard is part of the extensive framework of of less formal mechanisms such as experts being able
MPEG 21. Part 11 of the standard does not state a to refer to scientific findings; in fact, in common law
specific aim for the evaluations it standardizes countries these mechanisms carry more weight than
because it is not specifically written with forensic standards and certification.22
purposes in mind. It should be used by content
providers to select a watermarking technology that Contracts and evidence
best fits their functional requirements. The standard A court has discretion in assessing the evidentiary
indicates a number of best practices for defining a value of a watermark. This causes some uncertainty
test configuration and the actual evaluation of digital as to the extent to which a content provider can rely
watermarks. These best practices should be on a watermark as a means of evidence. In the license
implemented in working procedures and benchmark between the rights holder or distributor and the
14 Rechtbank Rotterdam 27-04-2005, LJN: AT4777, 18 S. Pereira, S. Voloshynovskiy, M. Madueno, S. and Ping W. Wong, editors, Security,
10/010049-04 and Gerechtshof s-Gravenhage 22- Marchand-Maillet and T. Pun, Second Steganography, and Watermarking of Multimedia
11-2005, LJN: AU6566, 2200301205. generation benchmarking and application Contents, VI (Proceedings Volume), Proceedings
15 For a more detailed discussion, see Stephen oriented evaluation, Information Hiding of SPIE Volume 5306, pp 236-247.
Mason, general editor, Electronic Evidence (2nd Workshop III, Pittsburgh, PA, USA, April 2001. 21 See Section 6 Use Cases for Evaluation of
edn, LexisNexis Butterworths, 2010), Chapters 3, 19 V Nikos Nikolaidis, Sofia Tsekeridou, Anastasios Persistent Association Tools of ISO/IEC TR
4 and 5, especially section 4.04, p 86. Tefas, Vassilios Solachidis, Athanasios Nikolaidis 21000-11:2004 Information technology --
16 ISO/IEC TR 21000-11:2004 Information technology and Ioannis Pitas, A benchmarking protocol for Multimedia framework (MPEG-21) -- Part 11:
-- Multimedia framework (MPEG-21) -- Part 11: watermarking methods, in IEEE International Evaluation Tools for Persistent Association
Evaluation Tools for Persistent Association Conference on Image Processing, volume 3, Technologies.
Technologies. October 2001, pp 10231026. 22 Stephen Mason, general editor, Electronic
17 F. A. P. Petitcolas, Watermarking schemes 20 Hyung Cook Kim, Hakeem Ogunleye, Oriol Evidence, p 86.
evaluation, IEEE Signal Processing, Volume 17, Guitart, and Edward J. Delp, The watermark
Issue 5, September 2000, pp 5864. evaluation testbed (WET), in Edward J. Delp III
Pario Communications Limited, 2011 Digital Evidence and Electronic Signature Law Review, Vol 8 161
DIGITAL WATERMARKS AS LEGAL EVIDENCE
licensee, provisions concerning evidence may be subjected to the general terms. In the context of
incorporated. Such provisions strengthen the position contracts between banks and their clients, it is, for
of the rights holder or distributor in civil cases example, stipulated that the administration of the
considerably, if the defendant is a contract partner or bank provides cogent proof. When arguing the
licensee. That the person identified by the watermark acceptability of this provision, the general confidence
is a licensee is probably the default situation since a that can be placed in banks is mentioned (this
watermark is used to identify the buyer of a copy of argument is perhaps a little weakened in
the work and digital copyrighted works are usually contemporary times). It is often observed that banks
only distributed under an (End User) License are subject to many legal rules regarding their
Agreement (EULA). The rights holder or distributor administration, and that compliance with these rules
may incorporate contractual provisions in the EULA is controlled by supervising institutions.23 With
that indicate what the evidentiary value of digital respect to watermarks, there are no legal rules
watermarks is. The provisions may, for example, governing watermarks and supervising institutions.
indicate that a watermark provides cogent proof of This does not mean that evidentiary provisions in
certain facts (such as the identity of the licensee) contract are invalid because trust in the reliability of
between the parties. By declaring certain evidence to watermarks could be organized in a different way. For
be cogent between parties, the discretion of the court example, standardization and certification could play
in assessing the evidentiary value of the proof is an important role in this respect.
removed; the court must accept the evidence as proof. A second issue is that a watermark can never prove
Provisions in a contract may also bypass the issue of more than that a certain copy of a work entered an
evidence altogether and directly impose certain illegal distribution channel. It provides no proof that
consequences upon positive identification. An the person registered as the legitimate holder of that
example may be a provision that allows the rights copy actually introduced the copy into the illegal
holder to obtain access to the records of the person distribution network. Additional evidence is necessary
identified by the watermark or even to obtain access to prove the identity of the person who entered the
to the buildings in order to check relevant business copy in the illegal channel. If a provision about cogent
procedures (such as those involving measures aimed proof is included in a contract and is found to be
at preventing copyright infringement). acceptable, this does not mean that the content
An important question is whether such agreements provider need not prove anything. He still will have to
about evidence are valid. In accordance with the show that, according to his registration of events, no
provisions of article 6:233 DCivC, such an agreement irregularities are apparent.24
when included in general conditions can be nullified if
it is unreasonably burdensome for the party subject General implications of proof by
to the general conditions. The main question is watermark
whether an agreement declaring watermarks to give The discussion has focused as to whether and if so
cogent proof is unreasonable. If an agreement does under what conditions digital watermarks may be
not allow the licensee to adduce proof of the used for copyright infringement protection purposes
opposite, such is the case (article 6:236 sub k DCivC under Dutch law. The wider implications of using
only applies to business to consumer transactions, watermarks for copyright infringement protection
and at best analogously applicable in business to purposes have not been addressed. Additional
business transactions). If an agreement allows proof concerns include how digital watermarks will affect
of the opposite, and only takes away the assessment businesses; whether it will revolutionize copyright
discretion from the court (cogent proof ), the enforcement, and what effect, if any, it will have on
agreement could be allowed. The agreement could society and individual citizens. The breadth of these
also be unreasonable if the evidence provided by a questions precludes that they will be dealt with
digital watermark is unreliable and chances are that exhaustively here. Therefore, some tentative
the unreliability is to the detriment of the party observations of will be made about the most
162 Digital Evidence and Electronic Signature Law Review, Vol 8 Pario Communications Limited, 2011
DIGITAL WATERMARKS AS LEGAL EVIDENCE
25 A. Gerkens, P. Smeets, F. Teeven and N. van backoffice.nl/uploads/file/Boek9%20/Andere%2 creative works on the internet) (HADOPI is the
Vroonhoven-Kok, Auteursrechten, een rapport, 0stukken/Eindrapport%20parlementaire%20wer acronym of the government agency created to
Werkgroep uit de vaste commissies voor Justitie kgroep%20auteursrechten_tcm118-189136.pdf. administer the law: Haute Autorit pour la
en voor Economische Zaken in de Tweede Kamer 26 In France, Loi favorisant la diffusion et la Diffusion des ?uvres et la Protection des Droits
van de Staten-Generaal, 2010, available at: protection de la cration sur Internet (law sur Internet); in the UK, the Digital Economy Act
http://www.boek9.nl/www.delex- promoting the distribution and protection of 2010.
Pario Communications Limited, 2011 Digital Evidence and Electronic Signature Law Review, Vol 8 163
DIGITAL WATERMARKS AS LEGAL EVIDENCE
somebodys home or personal sphere? A tough implementation details open and there is no
approach to enforcement also does not seem to be certification infrastructure in place for benchmarking
viable. In short, the use of digital watermarking in the tools or experts. Hence, there is room for improving
sphere of consumers is fraught with difficulties. the support given to courts in assessing watermark
Therefore, it is more likely that digital watermarks will evidence.
find use in a professional context, at least where it Although not strictly a legal issue, the success of
concerns copyright infringement protection. watermarking may also depend on the acceptance by
the people who will be involved in watermarking. In
Conclusion general, there is a development towards greater
This article assesses how digital watermarks can be involvement of third persons in the enforcement of
used as evidence in the context of copyright copyrights. This does not mean that those who are
infringement protection. The legal systems for proof registered in watermarks are prepared to accept
in civil and criminal cases in the Netherlands basically watermarked works. Their position seems to become
allow for the introduction of evidence by digital weaker when watermarked works start being used. A
watermark. The use of digital watermarks for positive identification at least morally places them in
copyright infringement protection purposes affects a defensive position, where they may be pressed to
the privacy of those licensees that can be identified provide an explanation for the leak. This may dampen
by the watermark. The identification in relation to the their willingness to buy works that have watermarks
circumstances in which a marked item of intellectual in place. It is unclear how and to what extent
property is found provides information about the licensees will use a possible bargaining position they
licensee: it possibly identifies him as the source of a have to negotiate restrictions upon the use of
leak and may give away information about the watermarks. The introduction of new watermarking
persons with whom he maintains contacts. However, schemes will in this respect require a delicate hand of
the watermark neither gives information about the rights holders.
circumstances under which the leak occurred nor
about the role the registered licensee played in it. Maurice Schellekens, 2011
This requires restraint from those interpreting positive
identifications. Deriving information from
identification by watermark is thus a sensitive process Dr. Maurice Schellekens is an assistant professor at the
and must take place under adequate privacy Tilburg Institute for Law, Technology, and Society at Tilburg
safeguards. Informing the licensee and protocols for University.
dealing with identification information are important http://www.tilburguniversity.edu/webwijs/show/?uid=
instruments. Privacy problems can be avoided if only m.h.m.schellekens
companies or organizations are registered as
licensees within watermarks. Literature of interest not cited
It is relevant that courts have an adequate R. Dekkers and A. Verbeke, Handboek Burgerlijk Recht,
understanding of the scientific aspects of proof by Deel III, Verbintenissen, Bewijsleer, Gebruikelijke
watermarks. These aspects are both relevant for the contracten, Antwerpen: Intersentia 2007.
assessment of the evidence as for the viability of M. C. D. Embregts, Uitsluitsel over bewijsuitsluiting. Een
(license) clauses dealing with the evidentiary value onderzoek naar de toelaatbaarheid van onrechtmatig
that is to be accorded to digital watermarks. verkregen bewijs in het strafrecht, het civiele recht en het
bestuursrecht (PhD research Tilburg), Kluwer 2003.
Information about scientific aspects reaches a court
though an expert witness. However, it is not easy for a T. R. Hidma and G. R. Rutgers, Pitlo, Het Nederlands
burgerlijk recht, Deel 7, Bewijs, Deventer: Kluwer 2004.
court to assess the knowledge of the witness or the
scientific adequacy of his testimony or report. M. Natarajan and Gayas Makhdumi, Safeguarding the
Digital Contents: Digital Watermarking, DESIDOC Journal of
Standards and certification can help a court in its
Library & Information Technology, Volume 29, Number 3,
assessment. There exists a standard for the May 2009, pp 29-35.
evaluation of persistent association technologies,
J. F. Nijboer, Strafrechtelijk bewijsrecht, Nijmegen: Ars
such as watermarks. However, the standard is not Aequi 2008.
designed for forensic applications, it leaves many
164 Digital Evidence and Electronic Signature Law Review, Vol 8 Pario Communications Limited, 2011
Copyright of Digital Evidence & Electronic Signature Law Review is the property of Pario
Communications Limited and its content may not be copied or emailed to multiple sites or
posted to a listserv without the copyright holder's express written permission. However, users
may print, download, or email articles for individual use.