Definition:Digital watermarking techniques are based on information hiding techniques similar to steganographic approaches with the overall goal to embed information into a cover signal, usually multi media data.
The term digital watermarking was used for the first time by Tirkel et al in [8], actually written in two words: “water mark”. Instead of a confidential or hidden communication, watermarking addresses the security aspects of data and user authentication or data integrity protection, where a digital watermark is a perceptually transparent pattern inserted in digital data using an embedding algorithm and an embedding key. A detection algorithm using the appropriate detection key can retrieve the watermark information. In most approaches the embedding and detection keys are secret, see more details in [1] or [10].
References
M. Cox and B. Miller, “Digital Watermarking,” Academic Press, San Diego, USA, ISBN 1-55860-714-5, 2002.
J. Dittmann, P. Wohlmacher, and K. Nahrstedt, “Multimedia and Security — Using Cryptographic and Watermarking Algorithms”, IEEE Multimedia, Vol. 8, No. 4, 2001, pp. 54–65.
G. Fridrich et al, “Invertile Authentication,” In: Security and Watermarking of Multimedia Contents III, P. W. Wong and E. J. Delp III, Editors, Proceedings of SPIE, Vol. 4314, pp. 197–208, 2001.
S. Katzenbeisser and J. Dittmann, “Malicious attacks on media authentication schemes based on invertible watermarks,” Proceedings of E. J. Delp III, P. W. Wong (Eds.): Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE, Vol. 5306, pp. 838–847, Electronic Imaging Science and Technologies, January 2004, San Jose, California, 2004.
M. Kutter, S. Voloshynovskiy, and A. Herrigel, “Watermark Copy Attack,” Proceedings of SPIE: Security and Watermarking of Multimedia Contents II, San Jose, California, USA, Vol. 3971, pp. 371–381, January 2000.
A. Lang, J. Dittmann, E. Lin, E.J. Delp III, “Application-oriented audio watermark benchmark service,” Proceedings of E. J. Delp III, P. W. Wong (Eds.): Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE, Vol. 5681, pp. 275–286, Electronic Imaging Science and Technologies, San Jose, California, USA, January 2005.
A. Macq, J. Dittmann, and E.J. Delp, “Benchmarking of Image Watermarking Algorithms for Digital Rights Management,” Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management, Vol. 92, No. 6, pp. 971–984, June 2004.
C.F. Osborne R.G. van Schyndel, and A.Z. Tirkel, “A Digital Watermark,” IEEE Inter-national Conference on Image Processing, Austin, Texas, pp. 86–90, November 1994.
F.A.P. Petitcolas, M. Steinebach, J. Dittmann, C. Fontaine, F. Raynal, and N. Fatès, “A public automated web-based evaluation service for watermarking schemes: StirMark Benchmark,” In Security and Watermarking of Multimedia Contents III, P. W. Wong, E. J. Delp III, Editors, Proceedings of SPIE, Vol. 4314, pp. 575–584, 2001.
F.A.P. Petticolas and S. Katzenbeisser, “Information Hiding Techniques for Steganography and Digital Watermarking,” Artech House Computer Security Series, ISBN: 1580530354, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, Inc.
About this entry
Cite this entry
Steinebach, M., Dittmann, J., Neuhold, E. (2006). Digital Watermarking. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/0-387-30038-4_60
Download citation
DOI: https://doi.org/10.1007/0-387-30038-4_60
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24395-5
Online ISBN: 978-0-387-30038-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering