Ask the Expert

Is a digital watermark a legitimate authentication factor?

What are digital watermarks, and are they legitimate authentication factors?

    Requires Free Membership to View

A digital watermark is a hidden seal that is embedded in a digital image, recording, document or even a Web page. It is created by making bit-level embedded code changes that are invisible to users, though some newer watermarking systems use cryptography that make it easier to catch those who try to make an illegal copy of the protected material. It is meant to prove authenticity, but as I'll explain, a digital watermark is not necessarily a legitimate authentication factor.

An authentication factor is something used to prove someone's identity, such as a user ID and password, a one-time password (OTP) token or smart card. Biometric devices are another possibility; they measure a unique physical characteristic of a user, like their fingerprint, voice or face. The key difference is that an authentication factor is unique to the individual, while a digital watermark is unique to a piece of content. Also, an authentication factor is used for granting access, while a watermark is meant for tracking malicious use, like the illegal copying of copyrighted data.

On the surface, it might appear that a digital watermark embedded in an image in a Web site could be used to protect against phishing attacks. The hidden watermark could be used to identify a legitimate Web site, distinguishing it from a bogus phishing site used for stealing credentials.

But as with anything else on a Web page, the watermark -- especially if it is not encrypted -- could be lifted inadvertently by a clever phisher that builds a mirror image of a targeted Web site. Since the watermark identifies the site, not the user, it doesn't really identify anybody. So while digital watermarking can be an effective tool for protecting copyrighted digital media, it shouldn't be used for authenticating systems.

For more information:

  • To learn more about authentication, visit SearchSecurity.com's Identity and Access Management School.
  • In this SearchSecurity.com Q&A, Joel Dubin explores the differences of risk-based authentication vs. static authentication.
  • This was first published in April 2007

    There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: