Skip to main content

On the Design of a Watermarking System: Considerations and Rationales

  • Conference paper
Information Hiding (IH 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1768))

Included in the following conference series:

Abstract

This paper summarizes considerations and rationales for the design of a watermark detector. In particular, we relate watermark detection to the problem of signal detection in the presence of (structured) noise. The paper builds on the mathematical results from several previously published papers (by our own research group or by others) to verify and support our discussion. In an attempt to unify the theoretical analysis of watermarking schemes, we propose several extensions which clarify the interrelations between the various schemes.

New results include the matched filter with whitening, where we consider the effect of the image and watermark spectra and imperfect setting of filter coefficients. The paper reflects our practical experience in developing watermarking systems for DVD copy protection and broadcast monitoring. The aim of this paper is to further develop the insight in the performance of watermark detectors, to discuss appropriate models for their analysis and to provide an intuitive rationale for making design choices for a watermark detector.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kalker, T., Depovere, G., Haitsma, J., Maes, M.J.: A video watermarking system for broadcast monitoring. In: Proceedings of SPIE, Security and Watermarking of Multimedia Content, vol. 3657, pp. 103–112 (1999)

    Google Scholar 

  2. Linnartz, J.P.M.G.: The ticket concept for copy control based on embedded signalling. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 257–274. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Bloom, J., Cox, I.J., Kalker, A.A.C., Linnartz, J.P.M.G., Miller, M., Traw, B.: Copy Protection for DVD. IEEE Proceedings, Special issue on Information and Protection of Multimedia Information 87(7), 1267–1266 (1999)

    Google Scholar 

  4. Cox, I.J., Miller, M.L.: A review of watermarking and the importance of perceptual modeling. In: Proc. of Electronic Imaging 1997 (February 1997)

    Google Scholar 

  5. Cox, I.J., Linnartz, J.P.M.G.: Some general methods for tampering with watermarks. IEEE Journ. of Sel. Areas in Comm. 16(4), 587–593 (1998)

    Article  Google Scholar 

  6. Cox, I.J., Miller, M.L., McKellips, A.L.: Watermarking as communications with side information. In: IEEE Proc., 87th edn., pp. 1127–1141.

    Google Scholar 

  7. Linnartz, J.P.M.G., Kalker, A.C.C., Depovere, G.F.: Modelling the false-alarm and missed detection rate for electronic watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  8. Linnartz, J.P.M.G., Kalker, A.C.C., Depovere, G.F., Beuker, R.: A reliability model for detection of electronic watermarks in digital images. In: Benelux Symposium on Communication Theory, Enschede, October 1997, pp. 202–209 (1997)

    Google Scholar 

  9. Jayant, N.S., Noll, P.: Digital Coding of waveforms, vol. 255. Prentice Hall, Englewood Cliffs (1984)

    Google Scholar 

  10. Pitas, I., Kaskalis, T.: Signature Casting on Digital Images. In: Proceedings IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras (June 1995)

    Google Scholar 

  11. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3/4) (1996)

    Google Scholar 

  12. Bender, W., Gruhl, D., Morimoto, N.: Techniques for Data Hiding. In: Proceedings of the SPIE, San Jose CA, USA, February 1995, pp. 2420–40 (1995)

    Google Scholar 

  13. Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Proc. Workshop on Information Hiding, May 30 - June 1, pp. 175–190. Univ. of Cambridge, U.K (1996)

    Google Scholar 

  14. Wozencraft, J., Jacobs, I.: Principles of Communication Engineering. Wiley, Chichester (1965)

    Google Scholar 

  15. Miller, M.L., Bloom, J.A.: Computing the probability of false watermark detection. In: Proc. Workshop on Information Hiding 1999, Dresden (1999)

    Google Scholar 

  16. Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Proc. Workshop on Information Hiding, May 30 - June 1, pp. 175–190. Univ. of Cambridge, U.K (1996)

    Google Scholar 

  17. Maes, M.: Twin peaks: the histogram attack on fized depth watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 290–305. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  18. Wireless Communication. In: The Interactive MultiMedia CD ROM, 3rd Edition, Baltzer Science Publishers, Amsterdam (1999), http://www.baltzer.nl/wirelesscd

  19. Marvel, L.M., Boncelet, C.G., Retter, C.T.: In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 48–61. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  20. Hernandez, J.R., Perez-Gonzalez, F., Rodriguez, J.M., Nieto, G.: Performance analysius of a 2D Multipulse Amplitude Modulation Scheme for data hiding and watermarking of still images. IEEE JSAC, May 1998  Vol.16(4), 510–524 (1998)

    Google Scholar 

  21. Langelaar, G.C., van der Lubbe, J.C.A., Biemond, J.: Copy protection for multimedia data based on labeling techniques. In: 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands (May 1996)

    Google Scholar 

  22. Depovere, G.F.G., Kalker, A.C.C., Linnartz, J.P.M.G.: Improved watermark detection reliability using filtering before correlation. In: Int. Conf. on Image Processing, ICIP, Chicago IL (October 1998)

    Google Scholar 

  23. Langelaar, G., Lagendijk, R., Biemond, J.: Removing Spread Spectrum Watermarks. In: Proceedings of Eusipco-1998, Rhodes, vol. IV, pp. 2281–2284 (1998)

    Google Scholar 

  24. Lipshitz, S.P., Wannamaker, R.A., Vanderkooy, J.: Quantization and Dither: A theoretical survey. J. Audio Eng. Soc 40(5), 355–375 (1992)

    Google Scholar 

  25. Kalker, T., Janssen, A.J.E.M.: Analysis of SPOMF Detection. Accepted at ICIP 1999, Kobe, Japan (1999)

    Google Scholar 

  26. Linnartz, J.P.M.G., Kalker, A.A.C., Haitsma, J.: Detecting electronic watermarks in digital video. In: Paper 3010, Invited paper for special session at ICCASP 1999, Phoenix, AR (March 1999)

    Google Scholar 

  27. Wu, M., Miller, M., Bloom, J., Cox, I.: Watermark detection and normalized correlation. Presented at ICCASP 1999, Phoenix (March 1999); at DSP Conference in Florance

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Linnartz, JP., Depovere, G., Kalker, T. (2000). On the Design of a Watermarking System: Considerations and Rationales. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_18

Download citation

  • DOI: https://doi.org/10.1007/10719724_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67182-4

  • Online ISBN: 978-3-540-46514-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics