SlideShare a Scribd company logo
1 of 3
Download to read offline
INTERNATIONAL JOURNAL OF TECHNOLOGICAL EXPLORATION AND LEARNING (IJTEL)
www.ijtel.org
IJTEL, ISSN: 2319-2135, VOL.3, NO.6, DECEMBER 2014 593
Overview of Ethical Issues in Digital Watermarking
Agbaje, M.O,
Department of Computer Sc.Babcock University, Nigeria
Omotosho O. J,
Department of Computer Sc.Babcock University, Nigeria
Adebayo, A.O,
Department of Computer Sc.Babcock University, Nigeria
Abstract— Ethics has to do with moral principles that
control or influence a person’s behavior. Research ethics
has taken a prime position in the process of research. Digital
watermarking as a technology that embeds information, in
machine-readable form, within the content of a digital media file
could raise privacy issues if deployed in ways that fail to take
privacy into account. Digital watermarking can be applied to
different applications including digital signatures,
fingerprinting, broadcast and publication monitoring,
authentication, copy control, and secret communication.
This paper brings to view various ethical concerns of
digital watermarking such as privacy, piracy, deception
and anonymity.
Keywords- Ethics; Digital Watermarking; Privacy;
Piracy; Anonimity.
I. INTRODUCTION
The world of research has moved from just carrying out
research as done in the past but the subject of ethical research
has assumed a much more central position in the research
process. Ethics is derived from the Greek word (ethika)
meaning “character”. It deals with customary ways of acting
and universal and relative judgments as to rightness or
wrongness of human conduct [1] . Ethics refers to the principle
of right and wrong that individuals acting as free moral agents,
use to make choices to guide their behavior [2], [3]. Ethics
refers to the code of morality or system of moral principles that
governs the appropriate conduct of a group and its members. It
is concerned primarily with things as they ought to be. In
investigating human conduct it is concerned with questions
such as: When is an act right? When is an act wrong? And
what is the nature or determining standard, of good and bad?
Research ethics specifically deal with the application of
moral rules and professional codes of conduct to the collection,
collation, analysis, reporting, and dissemination of information
about research subject, whether individually or as a group,
especially as regards acceptance of subjects’ right to privacy
and informed consent [4].
[1]Intellectual disciplines are product of cultural evolution.
It is therefore difficult to have a standard ethical guideline that
would embrace all disciplines. A single yard stick or criterion
infact, cannot be used to determine ethical principles within the
same discipline, much less across several disciplines. Digital
watermarking is an ongoing research field in computer science.
The methodology of research in this paper includes an
extensive literature review and inductive analysis of various
ethical issues from related works. This paper takes an overview
of the ethical principles associated with digital watermarking.
A person's view of reality (i.e., one’s metaphysics or
worldview or Weltanschauung) influences that person's view of
morality [5]. This possibility has broad implications for
understanding personal ethics in general and computer ethics in
particular. Four worldviews were revealed: Idealism, Realism,
Pragmatism, and Existentialism. Idealism is the view that
reality is ultimately grounded in the perfect, abstract, ideal
world—the world of spirit and ideas. Realism emphasizes the
ultimate importance of the natural world, that is, the physical,
material, sensible universe. Pragmatism suggests that reality is
not static in the sense of depending on absolute ideas or matter,
but rather is ultimately "in process" and must be constantly
probed and determined by social experimentation.
Existentialism holds that reality is not objective; rather it is
subjective and must be constructed by each individual. These
worldviews have implication on three examples of ethical
dilemmas relating to information technology i.e those
concerning piracy, privacy, and authority-deception.
The use of the computers despite its benefits causes ethical
problems. Computer ethics is derived from basic ethical
principles common to many areas. As computer is becoming
integrated into the society computer professionals must ensure
safe use of hardware and software so as not to violate ethical
use principles.
Digital watermarking is a technology that embeds
information, in machine-readable form, within the content of a
digital media file (for example, a movie, song, or photograph).
Digital watermarking is the process of embedding information
into digital material in such a way that it is imperceptible to a
human observer but easily detected by computer algorithm [9]
[10][13]. Digital watermarking as a technology that embeds
information, in machine-readable form, within the content of a
digital media file could raise privacy issues if deployed in ways
that fail to take privacy into account [6].
II. APPLICATIONS OF DIGITAL WATERMARKING
Digital watermarking can be applied to different
applications including digital signatures, fingerprinting,
broadcast and publication monitoring, authentication, copy
INTERNATIONAL JOURNAL OF TECHNOLOGICAL EXPLORATION AND LEARNING (IJTEL)
www.ijtel.org
IJTEL, ISSN: 2319-2135, VOL.3, NO.6, DECEMBER 2014 594
control, and secret communication (Kurt, 2013). As a
signature, the watermark identifies the owner of the content
and can be used as a fingerprint to identify content consumers.
For example, a specific watermarking technique is planned to
be used to secure passports against counterfeiting. In the
Broadcast and publication monitoring area, computer systems
can automatically monitors television and radio broadcast to
track the appearance of distributed material. Watermarking
technology can also be used to guarantee authenticity and can
be applied as proof that the content has not been altered since
insertion. The watermark is often designed in such a way that
any alteration either destroys the watermark or creates a
mismatch between the content and the watermark, which can
easily be detected. Furthermore, watermarking enables
applications for copy control. Here, the embedded watermark
information contains rules of usage and copying [7]
Though the main application of digital watermarking is to
secure the intellectual property, it can also be used in the
medical field. In using digital watermarks as container for
information about patients and their diagnosis, medical images,
for example, X-ray or nuclear magnetic resonance (NMR)
tomography could be automatically associated with the patient
[9]. Furthermore, digital watermarking could be used to save
context or meta-information in source documents. In using
special watermarking agents, generic search machines are able
to retrieve such information and can offer time-based media
documents as a result.
III. ETHICAL CONSIDERATION IN VARIOUS
DISCIPLINES
Computer ethics is the ethical use of the computer.
Commandments of computer ethics include; 1.Don’t use
computer to harm people 2. Don’t interfere with other people’s
computer 3. Don’t snoop around in other people’s files 4.Don,t
use computer to steal 5. Don’t use a computer to bear false
witness.6. Don’t copy or proprietary software for which you
have not paid 7. Don’t use other people’s computer resources
without authorization 8. Don’t appropriate others people
intellectual output 9. Do think about social consequences of
program written 10. Use a computer in a way that shows
consideration and respect for fellow humans [14].
[7] Three basic principles relevant to the ethics of research
involving human subjects: the principle of respect of persons,
beneficence and justice. He opined that not only in the conduct
of research is ethical guide line need to be followed but also in
management of data generated during the research that will
lead to a correct decision being taken.
Helsinki Declaration was made in respect to medical
profession and some of their declarations include: clinical
research must conform to moral and scientific principles which
justify medical research and should be based on laboratory and
animal experiments, clinical research should be conducted only
by scientifically qualified persons and under supervision of
qualified medical personnel e.t.c
[7] Issues on ethical management in data management to
include: competency of the data manager, conflict of interest,
confidentiality, right to information, intellectual property
rights(IPR),error in data and misconduct in data management.
[12] Thirteen ethical issues in social sciences which
include worthiness of project, competence boundaries,
informed consent, benefits, costs and reciprocity, harm and
risk, honesty and trust, privacy, confidentiality and anonymity,
intervention and advocacy, research integrity and quality,
ownership of data and use and misuse of data.
A. CTD proposed privacy principles
1. Privacy by design -- Companies should address privacy
considerations in the early design and planning phases of
digital watermarking applications, not late in the process as an
afterthought. Where applications involve multiple partners,
contracts should include appropriate privacy-related
commitments for each[6].
2. Avoid embedding independently useful identifying
information directly in watermarks -- Companies should seek
to ensure that even if unauthorized parties learn how to read the
watermarks, no meaningful information will be exposed. For
example, for most applications, the data actually embedded in
the watermark should consist merely of a random serial
number or other code, and the use of a consistent code to
correspond to a specific individual should be avoided wherever
practical[6][11].
3. Provide notice to end users -- When media files contain
individualized watermarks, end users should be provided with
notice disclosing key information such as the presence of the
watermarks, the data they convey, and the purpose for which
that data will be used. The prominence of notice should be
proportional to the extent and likelihood of any privacy impact
[6].
4. Control access to reading capability -- Members of the
public who happen to obtain a watermarked file generally
should not have easy access to the devices or software needed
to read the watermarks. Nor should government or law
enforcement authorities; if authorities need to decipher
watermarks deployed for non-governmental purposes, they can
obtain that information through appropriate legal process[6].
5. Respond appropriately when algorithms are
compromised -- Companies should reconsider how much
reliance to place on watermarking systems whose workings
have been exposed, particularly if there is a risk that
watermarks could be altered or forged.
6. Provide security and access controls for back-end
databases -- Companies deploying watermarking applications
should carefully protect the security of and control access to
any back-end databases containing information about
individuals[6][11].
7. Limit uses for secondary purposes -- The design of
watermarking applications should seek to limit, not facilitate,
future use of watermark information for purposes not related to
the application's original mission. Information should be
collected, retained, and disclosed only as necessary for the
original mission; back-end databases should avoid
unnecessarily centralizing all information about an individual
in one place; and companies should refrain from using
watermarks to unmask anonymous speakers who happen to
incorporate some marked content into commentary or criticism.
8. Provide reasonable access and correction procedures for
personally identifiable information -- Where watermarking
applications cause personally identifiable information to be
collected and stored, individuals should have reasonable means
INTERNATIONAL JOURNAL OF TECHNOLOGICAL EXPLORATION AND LEARNING (IJTEL)
www.ijtel.org
IJTEL, ISSN: 2319-2135, VOL.3, NO.6, DECEMBER 2014 595
of accessing information that pertains to them for purposes of
contesting inaccuracies [6].
IV. ETHICS IN DIGITALWATERMARKING
The ethics in digital watermarking can be classified from
our deductions from ethical principle as Privacy, piracy;
deception and anonymity as major issues to be dealt with in
designing digital watermarking systems. [6] Opined that the
most frequently raised privacy concern regarding digital
watermarks is that they could enable increased monitoring,
recording, or disclosure of an individual's media purchases or
usage. The fear, in other words, is that watermarking could
compromise an individual's ability to use and enjoy lawfully
acquired media on a private, anonymous basis. Other possible
privacy issues include the risk that watermarks could contain
personal information that could be exposed to third parties, and
the risk that errors in or manipulation of watermark data could
paint a false picture of an individual's behavior and perhaps
lead to adverse consequences, including potential legal
liability. Some of the issues identified are discussed below:
A. Privacy
Privacy refers to an individual’s ability to restrict the
collection, use and sale of confidential personal information.
The internet as we know is eroding privacy through the selling
of information collected through registration on websites. Few
laws regulate selling of personal information. [6] has already
various propositions for privacy for digital watermarking
researchers. Privacy issues include the risk that watermarks
could contain personal information that could be exposed to
third parties, and the risk that errors in or manipulation of
watermark data could paint a false picture of an individual's
behaviour and perhaps lead to adverse consequences, including
potential legal liability. Preservation of content providers
ownership properties and content receivers’ privacy is very
important [11].
B. Piracy
A public watermark should be detected or extracted by any
receiver, so that this detection / extraction process doesn’t need
any other element than the additional parameters needed are
made public. But for such watermarks, a robustness
requirement actually remains on the embedding process, which
is not meant to become publicly available. Privacy of the
watermarking process may be viewed as a constraint in the use
of watermarks. Piracy has to do with the use misuse of
someone property for which ownership and an owner’s wishes
for those resources/materials could not be established,
explicitly or implicitly. Forensic watermarking is used not only
to gather evidence for criminal proceedings, but also to enforce
contractual usage agreements between a content owner and the
people or companies with which it shares its content. It is
capable of providing positive, irrefutable evidence of misuse
for leaked content assets. This can be wrongly or rightly
applied.
C. Deception
In medical or military related cases or transactions the
watermarked information can be altered to deceive the
authority in case of any collision. There are several potential
problems with deception because it is a moral issue whether it
is ever acceptable to mislead other people deliberately or not.
D. Anonymity
A method to protect the identity of provider and receiver
and also to protect the contents of transferred data between
them must ensured. Anonymity is mainly concerned with
protecting the identity of the end users as well as
communication among users. It is important that during
transaction or medical usage owner’s information are protect.
To provide anonymity to users in these systems, the personal,
private, and sensitive information, such as the user name, user
identification and IP address of the user, must be hidden during
communication with others [11].
V. CONCLUSION
Understanding ethical principle aids better usage and
application of a technology even from the design state.
Therefore having a good grasp of ethical knowledge in the area
of digital watermarking will be all to the good, and promote
consumer confidence in the current marketplace for digital
media.
REFERENCES
[1] Obono O., Arowojolu, A.,Ajuwon A,J, Ogundipe G..A.T, Yakubo ,J A
and Falusi A.G(2006),Ethics in research,Methodology of basic and
applied research, 2nd Edition,University of Ibadan, pg 281-317.
[2] Yakubu Y.A(2008) Ethics in research, Methodology of basic and
applied research,conference proceedings, University of Ibadan ,Nigeria
[3] Isaac F.A (2008) Overview of ethics in human subject research,
Methodology of Basic and Applied Research, Conference proceedings,
University of Ibadan, Nigeria
[4] Olayemi O,O, AdeyinkG.F and Yinka O(2009):Ethical and Legal Issues
in Clinical and Social Research, Planning and Writing Grant
[5] Charles R. Crowell and Robert N. Barger (2007),A META VIEW OF
INFORMATION ETHICS
[6] CTD: Centre for democracy and technology (2008): privacy principles
for digital Watermarking.
[7] Juergen Seitz(2005),Digital watermarking for digital
multimedia,University of Cooperative Education Heidenheim, Germany,
Information Science Publishing.
[8] David Meg´ıas Jordi Serra-Ruiz, &Mehdi Fallahpour(2010), Efficient
self-synchronised blind audio watermarking system based on time
domain and FFT amplitude modification.
[9] Petitcolas, F.A.P., Anderson, R.J., & Kuhn, M.G. (1999). Information
hiding—A survey. Proceedings of the IEEE, 87(7), 1062–1078.
[10] Kurt Heutschi(2013):Acoustics II:audio watermarking,,ETH, Swiss
Federal Institute of Technology, Zurich
[11] Qureshi, A.; Rifa-pous, H; Megias, D (2013). “Security, privacy and
anonymity in legal distribution of copyrighted multimedia content over
peer-to-peer networks: A brief overview”. IN3 Working Paper Series.
IN3 (UOC). [Accessed: 11/02/14].<url>
<http://in3wps.uoc.edu/ojs/index.php/in3-working-paper-
series/article/view/n-13-qureshi/n13-qureshi>
[12] Miles, M.B. and Huberman, A.M(1994),Qualitative Data Analysis, 2nd
ed., Thousand Oaks,CA:sage
[13] Bamgboye E.A and Odaibo, A.B(2009),Ethical issues in Data
Management ,Data collection, Management and analysis in academic
research, Proceedings of a workshop, University of Ibadan.
[14] General Introduction to Computing, The Department of Computer
Science and Mathematics, Babcock University, Ilisan Remo, Ogun
State, Nigeria(2010)

More Related Content

What's hot

Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2AVISHITYAGI
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentationICCNS
 
Internet Science
Internet ScienceInternet Science
Internet Sciencei_scienceEU
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technologyRimple Darra
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Societykerjait
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
Bring Your Own Internet of Things: BYO‐IoT
Bring Your Own Internet of Things: BYO‐IoTBring Your Own Internet of Things: BYO‐IoT
Bring Your Own Internet of Things: BYO‐IoTPriyanka Aash
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 

What's hot (20)

Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
 
B.Ed class-1
B.Ed class-1B.Ed class-1
B.Ed class-1
 
Hritik Singh
Hritik SinghHritik Singh
Hritik Singh
 
Internet Science
Internet ScienceInternet Science
Internet Science
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technology
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Society
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
интернет
интернетинтернет
интернет
 
What is ICT?
What is ICT?What is ICT?
What is ICT?
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Identity Management Policy Seminar
Identity Management Policy SeminarIdentity Management Policy Seminar
Identity Management Policy Seminar
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
Bring Your Own Internet of Things: BYO‐IoT
Bring Your Own Internet of Things: BYO‐IoTBring Your Own Internet of Things: BYO‐IoT
Bring Your Own Internet of Things: BYO‐IoT
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Alloy Cybersecurity
Alloy CybersecurityAlloy Cybersecurity
Alloy Cybersecurity
 

Similar to Overview of Ethical Issues in Digital Watermarking

chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...ijtsrd
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfmt5854804210
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxPallawiBulakh1
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExEADTU
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protectionNicha Tatsaneeyapan
 
Research methods - ethics
Research methods - ethicsResearch methods - ethics
Research methods - ethicsTracy Harwood
 
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...Nele Heise
 
Ppt IT Infrastructure.ppt
Ppt IT Infrastructure.pptPpt IT Infrastructure.ppt
Ppt IT Infrastructure.ppt23017156038
 
Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxcaniceconsulting
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Karlos Svoboda
 
Outline D
Outline DOutline D
Outline Dbutest
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisSherif Zahran
 

Similar to Overview of Ethical Issues in Digital Watermarking (20)

chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protection
 
Research methods - ethics
Research methods - ethicsResearch methods - ethics
Research methods - ethics
 
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...
 
Ppt IT Infrastructure.ppt
Ppt IT Infrastructure.pptPpt IT Infrastructure.ppt
Ppt IT Infrastructure.ppt
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
9th
9th9th
9th
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptx
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
 
Outline D
Outline DOutline D
Outline D
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive Analysis
 

More from Dr. Michael Agbaje

Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSICA REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSICDr. Michael Agbaje
 
Agbaje7survey of softwar process
Agbaje7survey of softwar processAgbaje7survey of softwar process
Agbaje7survey of softwar processDr. Michael Agbaje
 
Model based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumoursModel based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumoursDr. Michael Agbaje
 
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONPARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONDr. Michael Agbaje
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureDr. Michael Agbaje
 
Broadcast Monitoring and Applications
Broadcast Monitoring and ApplicationsBroadcast Monitoring and Applications
Broadcast Monitoring and ApplicationsDr. Michael Agbaje
 
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesDr. Michael Agbaje
 
A 3-dimensional motion sensor and tracking system using vector analysis method
A 3-dimensional  motion sensor and tracking system using vector  analysis methodA 3-dimensional  motion sensor and tracking system using vector  analysis method
A 3-dimensional motion sensor and tracking system using vector analysis methodDr. Michael Agbaje
 
Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)Dr. Michael Agbaje
 

More from Dr. Michael Agbaje (10)

Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSICA REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
 
Agbaje7survey of softwar process
Agbaje7survey of softwar processAgbaje7survey of softwar process
Agbaje7survey of softwar process
 
Model based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumoursModel based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumours
 
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONPARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System Architecture
 
Broadcast Monitoring and Applications
Broadcast Monitoring and ApplicationsBroadcast Monitoring and Applications
Broadcast Monitoring and Applications
 
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital Images
 
A 3-dimensional motion sensor and tracking system using vector analysis method
A 3-dimensional  motion sensor and tracking system using vector  analysis methodA 3-dimensional  motion sensor and tracking system using vector  analysis method
A 3-dimensional motion sensor and tracking system using vector analysis method
 
Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Overview of Ethical Issues in Digital Watermarking

  • 1. INTERNATIONAL JOURNAL OF TECHNOLOGICAL EXPLORATION AND LEARNING (IJTEL) www.ijtel.org IJTEL, ISSN: 2319-2135, VOL.3, NO.6, DECEMBER 2014 593 Overview of Ethical Issues in Digital Watermarking Agbaje, M.O, Department of Computer Sc.Babcock University, Nigeria Omotosho O. J, Department of Computer Sc.Babcock University, Nigeria Adebayo, A.O, Department of Computer Sc.Babcock University, Nigeria Abstract— Ethics has to do with moral principles that control or influence a person’s behavior. Research ethics has taken a prime position in the process of research. Digital watermarking as a technology that embeds information, in machine-readable form, within the content of a digital media file could raise privacy issues if deployed in ways that fail to take privacy into account. Digital watermarking can be applied to different applications including digital signatures, fingerprinting, broadcast and publication monitoring, authentication, copy control, and secret communication. This paper brings to view various ethical concerns of digital watermarking such as privacy, piracy, deception and anonymity. Keywords- Ethics; Digital Watermarking; Privacy; Piracy; Anonimity. I. INTRODUCTION The world of research has moved from just carrying out research as done in the past but the subject of ethical research has assumed a much more central position in the research process. Ethics is derived from the Greek word (ethika) meaning “character”. It deals with customary ways of acting and universal and relative judgments as to rightness or wrongness of human conduct [1] . Ethics refers to the principle of right and wrong that individuals acting as free moral agents, use to make choices to guide their behavior [2], [3]. Ethics refers to the code of morality or system of moral principles that governs the appropriate conduct of a group and its members. It is concerned primarily with things as they ought to be. In investigating human conduct it is concerned with questions such as: When is an act right? When is an act wrong? And what is the nature or determining standard, of good and bad? Research ethics specifically deal with the application of moral rules and professional codes of conduct to the collection, collation, analysis, reporting, and dissemination of information about research subject, whether individually or as a group, especially as regards acceptance of subjects’ right to privacy and informed consent [4]. [1]Intellectual disciplines are product of cultural evolution. It is therefore difficult to have a standard ethical guideline that would embrace all disciplines. A single yard stick or criterion infact, cannot be used to determine ethical principles within the same discipline, much less across several disciplines. Digital watermarking is an ongoing research field in computer science. The methodology of research in this paper includes an extensive literature review and inductive analysis of various ethical issues from related works. This paper takes an overview of the ethical principles associated with digital watermarking. A person's view of reality (i.e., one’s metaphysics or worldview or Weltanschauung) influences that person's view of morality [5]. This possibility has broad implications for understanding personal ethics in general and computer ethics in particular. Four worldviews were revealed: Idealism, Realism, Pragmatism, and Existentialism. Idealism is the view that reality is ultimately grounded in the perfect, abstract, ideal world—the world of spirit and ideas. Realism emphasizes the ultimate importance of the natural world, that is, the physical, material, sensible universe. Pragmatism suggests that reality is not static in the sense of depending on absolute ideas or matter, but rather is ultimately "in process" and must be constantly probed and determined by social experimentation. Existentialism holds that reality is not objective; rather it is subjective and must be constructed by each individual. These worldviews have implication on three examples of ethical dilemmas relating to information technology i.e those concerning piracy, privacy, and authority-deception. The use of the computers despite its benefits causes ethical problems. Computer ethics is derived from basic ethical principles common to many areas. As computer is becoming integrated into the society computer professionals must ensure safe use of hardware and software so as not to violate ethical use principles. Digital watermarking is a technology that embeds information, in machine-readable form, within the content of a digital media file (for example, a movie, song, or photograph). Digital watermarking is the process of embedding information into digital material in such a way that it is imperceptible to a human observer but easily detected by computer algorithm [9] [10][13]. Digital watermarking as a technology that embeds information, in machine-readable form, within the content of a digital media file could raise privacy issues if deployed in ways that fail to take privacy into account [6]. II. APPLICATIONS OF DIGITAL WATERMARKING Digital watermarking can be applied to different applications including digital signatures, fingerprinting, broadcast and publication monitoring, authentication, copy
  • 2. INTERNATIONAL JOURNAL OF TECHNOLOGICAL EXPLORATION AND LEARNING (IJTEL) www.ijtel.org IJTEL, ISSN: 2319-2135, VOL.3, NO.6, DECEMBER 2014 594 control, and secret communication (Kurt, 2013). As a signature, the watermark identifies the owner of the content and can be used as a fingerprint to identify content consumers. For example, a specific watermarking technique is planned to be used to secure passports against counterfeiting. In the Broadcast and publication monitoring area, computer systems can automatically monitors television and radio broadcast to track the appearance of distributed material. Watermarking technology can also be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. The watermark is often designed in such a way that any alteration either destroys the watermark or creates a mismatch between the content and the watermark, which can easily be detected. Furthermore, watermarking enables applications for copy control. Here, the embedded watermark information contains rules of usage and copying [7] Though the main application of digital watermarking is to secure the intellectual property, it can also be used in the medical field. In using digital watermarks as container for information about patients and their diagnosis, medical images, for example, X-ray or nuclear magnetic resonance (NMR) tomography could be automatically associated with the patient [9]. Furthermore, digital watermarking could be used to save context or meta-information in source documents. In using special watermarking agents, generic search machines are able to retrieve such information and can offer time-based media documents as a result. III. ETHICAL CONSIDERATION IN VARIOUS DISCIPLINES Computer ethics is the ethical use of the computer. Commandments of computer ethics include; 1.Don’t use computer to harm people 2. Don’t interfere with other people’s computer 3. Don’t snoop around in other people’s files 4.Don,t use computer to steal 5. Don’t use a computer to bear false witness.6. Don’t copy or proprietary software for which you have not paid 7. Don’t use other people’s computer resources without authorization 8. Don’t appropriate others people intellectual output 9. Do think about social consequences of program written 10. Use a computer in a way that shows consideration and respect for fellow humans [14]. [7] Three basic principles relevant to the ethics of research involving human subjects: the principle of respect of persons, beneficence and justice. He opined that not only in the conduct of research is ethical guide line need to be followed but also in management of data generated during the research that will lead to a correct decision being taken. Helsinki Declaration was made in respect to medical profession and some of their declarations include: clinical research must conform to moral and scientific principles which justify medical research and should be based on laboratory and animal experiments, clinical research should be conducted only by scientifically qualified persons and under supervision of qualified medical personnel e.t.c [7] Issues on ethical management in data management to include: competency of the data manager, conflict of interest, confidentiality, right to information, intellectual property rights(IPR),error in data and misconduct in data management. [12] Thirteen ethical issues in social sciences which include worthiness of project, competence boundaries, informed consent, benefits, costs and reciprocity, harm and risk, honesty and trust, privacy, confidentiality and anonymity, intervention and advocacy, research integrity and quality, ownership of data and use and misuse of data. A. CTD proposed privacy principles 1. Privacy by design -- Companies should address privacy considerations in the early design and planning phases of digital watermarking applications, not late in the process as an afterthought. Where applications involve multiple partners, contracts should include appropriate privacy-related commitments for each[6]. 2. Avoid embedding independently useful identifying information directly in watermarks -- Companies should seek to ensure that even if unauthorized parties learn how to read the watermarks, no meaningful information will be exposed. For example, for most applications, the data actually embedded in the watermark should consist merely of a random serial number or other code, and the use of a consistent code to correspond to a specific individual should be avoided wherever practical[6][11]. 3. Provide notice to end users -- When media files contain individualized watermarks, end users should be provided with notice disclosing key information such as the presence of the watermarks, the data they convey, and the purpose for which that data will be used. The prominence of notice should be proportional to the extent and likelihood of any privacy impact [6]. 4. Control access to reading capability -- Members of the public who happen to obtain a watermarked file generally should not have easy access to the devices or software needed to read the watermarks. Nor should government or law enforcement authorities; if authorities need to decipher watermarks deployed for non-governmental purposes, they can obtain that information through appropriate legal process[6]. 5. Respond appropriately when algorithms are compromised -- Companies should reconsider how much reliance to place on watermarking systems whose workings have been exposed, particularly if there is a risk that watermarks could be altered or forged. 6. Provide security and access controls for back-end databases -- Companies deploying watermarking applications should carefully protect the security of and control access to any back-end databases containing information about individuals[6][11]. 7. Limit uses for secondary purposes -- The design of watermarking applications should seek to limit, not facilitate, future use of watermark information for purposes not related to the application's original mission. Information should be collected, retained, and disclosed only as necessary for the original mission; back-end databases should avoid unnecessarily centralizing all information about an individual in one place; and companies should refrain from using watermarks to unmask anonymous speakers who happen to incorporate some marked content into commentary or criticism. 8. Provide reasonable access and correction procedures for personally identifiable information -- Where watermarking applications cause personally identifiable information to be collected and stored, individuals should have reasonable means
  • 3. INTERNATIONAL JOURNAL OF TECHNOLOGICAL EXPLORATION AND LEARNING (IJTEL) www.ijtel.org IJTEL, ISSN: 2319-2135, VOL.3, NO.6, DECEMBER 2014 595 of accessing information that pertains to them for purposes of contesting inaccuracies [6]. IV. ETHICS IN DIGITALWATERMARKING The ethics in digital watermarking can be classified from our deductions from ethical principle as Privacy, piracy; deception and anonymity as major issues to be dealt with in designing digital watermarking systems. [6] Opined that the most frequently raised privacy concern regarding digital watermarks is that they could enable increased monitoring, recording, or disclosure of an individual's media purchases or usage. The fear, in other words, is that watermarking could compromise an individual's ability to use and enjoy lawfully acquired media on a private, anonymous basis. Other possible privacy issues include the risk that watermarks could contain personal information that could be exposed to third parties, and the risk that errors in or manipulation of watermark data could paint a false picture of an individual's behavior and perhaps lead to adverse consequences, including potential legal liability. Some of the issues identified are discussed below: A. Privacy Privacy refers to an individual’s ability to restrict the collection, use and sale of confidential personal information. The internet as we know is eroding privacy through the selling of information collected through registration on websites. Few laws regulate selling of personal information. [6] has already various propositions for privacy for digital watermarking researchers. Privacy issues include the risk that watermarks could contain personal information that could be exposed to third parties, and the risk that errors in or manipulation of watermark data could paint a false picture of an individual's behaviour and perhaps lead to adverse consequences, including potential legal liability. Preservation of content providers ownership properties and content receivers’ privacy is very important [11]. B. Piracy A public watermark should be detected or extracted by any receiver, so that this detection / extraction process doesn’t need any other element than the additional parameters needed are made public. But for such watermarks, a robustness requirement actually remains on the embedding process, which is not meant to become publicly available. Privacy of the watermarking process may be viewed as a constraint in the use of watermarks. Piracy has to do with the use misuse of someone property for which ownership and an owner’s wishes for those resources/materials could not be established, explicitly or implicitly. Forensic watermarking is used not only to gather evidence for criminal proceedings, but also to enforce contractual usage agreements between a content owner and the people or companies with which it shares its content. It is capable of providing positive, irrefutable evidence of misuse for leaked content assets. This can be wrongly or rightly applied. C. Deception In medical or military related cases or transactions the watermarked information can be altered to deceive the authority in case of any collision. There are several potential problems with deception because it is a moral issue whether it is ever acceptable to mislead other people deliberately or not. D. Anonymity A method to protect the identity of provider and receiver and also to protect the contents of transferred data between them must ensured. Anonymity is mainly concerned with protecting the identity of the end users as well as communication among users. It is important that during transaction or medical usage owner’s information are protect. To provide anonymity to users in these systems, the personal, private, and sensitive information, such as the user name, user identification and IP address of the user, must be hidden during communication with others [11]. V. CONCLUSION Understanding ethical principle aids better usage and application of a technology even from the design state. Therefore having a good grasp of ethical knowledge in the area of digital watermarking will be all to the good, and promote consumer confidence in the current marketplace for digital media. REFERENCES [1] Obono O., Arowojolu, A.,Ajuwon A,J, Ogundipe G..A.T, Yakubo ,J A and Falusi A.G(2006),Ethics in research,Methodology of basic and applied research, 2nd Edition,University of Ibadan, pg 281-317. [2] Yakubu Y.A(2008) Ethics in research, Methodology of basic and applied research,conference proceedings, University of Ibadan ,Nigeria [3] Isaac F.A (2008) Overview of ethics in human subject research, Methodology of Basic and Applied Research, Conference proceedings, University of Ibadan, Nigeria [4] Olayemi O,O, AdeyinkG.F and Yinka O(2009):Ethical and Legal Issues in Clinical and Social Research, Planning and Writing Grant [5] Charles R. Crowell and Robert N. Barger (2007),A META VIEW OF INFORMATION ETHICS [6] CTD: Centre for democracy and technology (2008): privacy principles for digital Watermarking. [7] Juergen Seitz(2005),Digital watermarking for digital multimedia,University of Cooperative Education Heidenheim, Germany, Information Science Publishing. [8] David Meg´ıas Jordi Serra-Ruiz, &Mehdi Fallahpour(2010), Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification. [9] Petitcolas, F.A.P., Anderson, R.J., & Kuhn, M.G. (1999). Information hiding—A survey. Proceedings of the IEEE, 87(7), 1062–1078. [10] Kurt Heutschi(2013):Acoustics II:audio watermarking,,ETH, Swiss Federal Institute of Technology, Zurich [11] Qureshi, A.; Rifa-pous, H; Megias, D (2013). “Security, privacy and anonymity in legal distribution of copyrighted multimedia content over peer-to-peer networks: A brief overview”. IN3 Working Paper Series. IN3 (UOC). [Accessed: 11/02/14].<url> <http://in3wps.uoc.edu/ojs/index.php/in3-working-paper- series/article/view/n-13-qureshi/n13-qureshi> [12] Miles, M.B. and Huberman, A.M(1994),Qualitative Data Analysis, 2nd ed., Thousand Oaks,CA:sage [13] Bamgboye E.A and Odaibo, A.B(2009),Ethical issues in Data Management ,Data collection, Management and analysis in academic research, Proceedings of a workshop, University of Ibadan. [14] General Introduction to Computing, The Department of Computer Science and Mathematics, Babcock University, Ilisan Remo, Ogun State, Nigeria(2010)