Skip to main content

A Copy Attack Resilient Blind Watermarking Algorithm Based on Independent Feature Components

  • Conference paper
Advances in Neural Networks – ISNN 2005 (ISNN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3497))

Included in the following conference series:

  • 1641 Accesses

Abstract

Digital watermarking is an enabling technique to prove the ownership of copyrighted digital products. But its utility may be reduced greatly by copy attack which can cause ownership ambiguity. In this paper, a blind digital watermarking algorithm resistant to copy attack is proposed. By adopting the independent component analysis (ICA) technique, the most stable independent feature component (IFC) of the host image can be obtained in which to embed the watermark. Symmetrically, the watermark detection is just the investigation of the marked image’s IFCs without the host image. In addition, the threat of copy attack can be mitigated, because no watermark can be detected from the copy attacked image’s IFCs. Theoretical analysis and simulation results show that the algorithm proposed here can resist copy attack as well as the common image manipulations.

This work was supported by the Excellent Young Scientist Award Foundation of Shandong (No. 01BS04).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Kutter, M., Voloshynovskiy, S., Herrigel, A.: The Watermark Copy Attack. In: Proc. SPIE, vol. 3971, pp. 371–379 (2000)

    Google Scholar 

  2. Barr, J., Bradley, B., Hannigan, B.T.: Using Digital Watermarks with Image Signatures to Mitigate the Threat of the Copy Attack. In: ICASSP 2003, vol. 3, pp. 69–72 (2003)

    Google Scholar 

  3. Lu, C., Liao, H.M., Kutter, M.: Denoising and Copy Attacks Resilient Watermarking by Exploiting Prior Knowledge at Detector. IEEE Trans. on Image Processing 11, 280–290 (2002)

    Article  Google Scholar 

  4. Cardoso, J.F., Souloumiac, A.: Blind Beamforming for Non-Gaussian Signals. IEEE Proceedings- F 140, 362–370 (1993)

    Google Scholar 

  5. Yu, D., Sattar, F., Ma, K.K.: Watermark Detection and Extraction using Independent Component Analysis Method. EURASIP JASP 1, 92–104 (2002)

    Google Scholar 

  6. Liu, J., Zhang, X., Sun, J., Lagunas, M.A.: A Digital Watermarking Scheme based on ICA Detection. In: ICA 2003, pp. 215–220 (2003)

    Google Scholar 

  7. Conzález-Serrano, F.J., Murillo-Fuentes, J.J.: Independent Component Analysis Applied to Digital Image Watermarking. In: ICASSP 2001, vol. 3, pp. 7–11 (2001)

    Google Scholar 

  8. Liu, J., Sun, J., Du, Z., Wan, Y.: Embodying Information into Images by an MMI-Based Independent Component Analysis Algorithm. In: ICSP 2002, vol. 2, pp. 1600–1603 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, J., Hu, H., Sun, J., Huang, Y. (2005). A Copy Attack Resilient Blind Watermarking Algorithm Based on Independent Feature Components. In: Wang, J., Liao, XF., Yi, Z. (eds) Advances in Neural Networks – ISNN 2005. ISNN 2005. Lecture Notes in Computer Science, vol 3497. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427445_125

Download citation

  • DOI: https://doi.org/10.1007/11427445_125

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25913-8

  • Online ISBN: 978-3-540-32067-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics