Skip to main content

Implications for Image Watermarking of Recent Work in Image Analysis and Representation

  • Conference paper
  • First Online:
Digital Watermarking (IWDW 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2613))

Included in the following conference series:

Abstract

We consider the potential implications of recent developments in subfields of image analysis and image representation for watermarking and steganography. We consider three rapidly developing subfields: 1. Natural Scene Statistics; 2. Level Set Image Processing and Geometric Diffusion; and 3. Computational Harmonic Analysis. Each of these subfields has recently claimed progress either in characterizing or processing images. We interpret all such progress as implicitly or explicitly identifying invariants of real images. Such invariants are potential tools for studying the effects of watermarking or steganography in an image. We briefly survey these three subfields, give several examples of such invariants, and explore the effects of model watermarking schemes on such invariants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ambrosio, L. and Tortorelli, V.: Approximation of functionals depending on jumps by elliptic functional via Γ-convergence, Commun. Pure. Appl. Math., 43 (no. 8) (1990).

    Google Scholar 

  2. Barni, M., Bertollini, F., Cox, I. Hernandez, J. and Perez-Gonzalez, F.: Digital Watermarking for copyright protection: a communications perspective. IEEE Comunications Magazine August 2001 90–116.

    Google Scholar 

  3. Bell, A.J. and Sejnowski, T.J.: An information-maximization approach to blind separation and blind deconvolution. Neural Computation. 7 (1995) 1129–1159

    Article  Google Scholar 

  4. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal. 35 (no 3,4) (1996) 313–336.

    Article  Google Scholar 

  5. Bertalmio, M., Sapiro, G., Ballester, C. and Caselles, C.: Image inpainting. Computer Graphics, SIGGRAPH 2000, July 2000.

    Google Scholar 

  6. Buccigrossi, R.W. and Simoncelli, E.P.: Image compression via joint statistical characterization in the wavelet domain. IEEE Transactions on Image Processing, 8, (no.12) Dec. 1999 1688–701.

    Article  Google Scholar 

  7. Candès, E.: Ridgelets: Theory and Applications. Ph.D. Thesis, Department of Statistics, Stanford University, 1998.

    Google Scholar 

  8. Candès, E and Donoho, D.: Ridgelets: The key to High-Dimensional Intermittency?. Phil. Trans. R. Soc. Lond. A. 357 (1999), 2495–2509.

    Article  MATH  Google Scholar 

  9. Candès, E and Donoho, D.: Curvelets: a surprisingly effective nonadaptive representationof objects with edges. In: Albert Cohen, Christophe Rabut, and Larry L. Schumaker (eds.). Curve and Surface Fitting: Saint-Malo. Vanderbilt University Press, Nashville, TN. ISBN 0-8265-1357-3, 1999.

    Google Scholar 

  10. Cox, I., Bloom, J., Miller, M.: DigitalWatermarking, Morgan Kaufmann Publishers (2001).

    Google Scholar 

  11. Cox, I., Lilian, J., Leighton, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on image processing. 6 (no.1) (1997) 1673–1687.

    Article  Google Scholar 

  12. Cox, I., Miller, M. and Mckeillips, A.: Watermarking as communications with side information. Proceeding of the IEEE 87 No.7 July 1999 1127–1141.

    Google Scholar 

  13. Donoho, D.: Orthonormal Ridgelets and Linear Singularities. SIAM J. Math Anal. 31 (no 5) (2000) 1062–1099.

    Article  MATH  MathSciNet  Google Scholar 

  14. Donoho, D. Ridge Functions and Orthonormal Ridgelets. Journ. Approx. Thry. 111 (2001) 143–179.

    Article  MATH  MathSciNet  Google Scholar 

  15. Donoho, D.L., Flesia, A.G.: Can recent innovations in harmonic analysis “explain” key findings in natural image statistics?. Network: Computation in Neural Systems 12 (no.3) (Natural Stimulus Statistics Workshop 2000, Long Island, USA, Oct. 2000.) IOP Publishing Aug. 2001 371–93.

    Google Scholar 

  16. Donoho, D.L., Flesia, A.G.: Digital ridgelet transform based on true ridge functions. To appear in BeyondWavelets. J. Stoeckler and G. Welland (Eds). Academic Press, December 2002.

    Google Scholar 

  17. Dugelay, J.L. and Roche, S. A survey of current watermarking techniques. In: Katzenbeisser, S. and Petitcolas, F. (eds). Information Hiding, Techniques for Steganography and DigitalWatermarking, Computer Security Series, Artech House (2000) 121–148.

    Google Scholar 

  18. Esedoglu, S. and Shen, J.: Digital Inpainting based on the Mumford-Shah-Euler image model. European J. Applied Mathematics, in press, 2002

    Google Scholar 

  19. Farid, H: Detecting steganographic messages in digital images. Technical Report 2001-412, Dartmouth College, Computer Science. http://www.cs.dartmouth.edu/ farid/publications/tr01.html.

  20. Hannigan, B., Reed, A. and Bradley, B.: Digital watermarking using improved human visual system model.

    Google Scholar 

  21. Hartung, F. and Kutter, M.: Multimedia watermarking techniques. Proceeding of the IEEE. 87 (no.7) July 1999 1079–1107.

    Google Scholar 

  22. Herrigel, A., O Ruanaidh, J., Petersen, H. Pereira, S. and Pun, T.: Secure copyright protection techniques for digital images. In: Aucsmith, D. (ed.): Information Hiding. Lecture Notes in Computer Science, Vol. 1525, Springer-Verlag, Berlin Heidelberg New York (1998) 169–190.

    Chapter  Google Scholar 

  23. Information Hiding, techniques for steganography and digital watermarking. In: Computer Security Series. Katzenbeisser, S. and Petitcolas, F. (eds), Artech House (2000).

    Google Scholar 

  24. Information theoretic aspects of digital watermarking. Special Issue of Signal Processing. Elsevier for EURASIP, 81 (no.6) June 2001 1117–1119.

    Google Scholar 

  25. Johnson, N., Jajodia, S., Duric, Z.: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Kluer Academic Publishers (2000).

    Google Scholar 

  26. Kutter, M. and Hartung, F.: Introduction to watermarking techniques. In: Katzenbeisser, S. and Petitcolas, F. (eds). Information Hiding, Techniques for Steganography and Digital Watermarking, Computer Security Series, Artech House (2000).

    Google Scholar 

  27. Langelaar, G., Setyaman, I. and Lagendijk, R.: Watermarking digital image and video data. A state of the art overview. IEEE Signal Processing Magazine. 17 (no.5) September 2000 20–46.

    Article  Google Scholar 

  28. Maes, M., Kalker, T., Linnartz, J.P., Talstra, J., Depovere, G., Haitsma, J.: Digital watermarking for DVD Video Copy protection. IEEE Signal Processing Magazine. Sept. 2000 47–57.

    Google Scholar 

  29. Memon, N. and Wah Wong, P.: Protecting Digital Media Content. Comunications of the ACM. 41 (no.7) July 1998 35–43.

    Article  Google Scholar 

  30. Miller, M., Cox, I., Linnartz, J.P. and Kalker, T.: A review of watermarking principles and practices. In: Parhi, K. and Nishitani, T. (eds.) Digital Signal Processing in Multimedia Systems, Marcel Dekker Inc. (1999) 461–485.

    Google Scholar 

  31. Mumford, D. and Shah, J.: Optimal approximation by piecewise smooth functions and associated variational problems. Comm. Pure. Appl. Math., vol. 42, no. 4, 1989.

    Google Scholar 

  32. Mumford, D. and Gidas, B.: Stochastic models for generic images. Technical report, Division of Applied Mathematics, Brown University, 1998. http://citeseer.nj.nec.com/mumford99stochastic.html

  33. Olshausen, B. and Field, D.: Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature 381 (1996) 607–609.

    Article  Google Scholar 

  34. Olshausen, B and Field, D.: Natural Image statistics and efficient image coding. Network: Computation on neural systems. 7 (1996) 3333–3339.

    Google Scholar 

  35. Petiticolas, F., Anderson, R. and Kuhn, M.: Information Hiding: a survey. Proceeding of the IEEE 87 (no.7) July 1999 1062–1078.

    Google Scholar 

  36. Podilchuk, C. and Delp, E.: Digital watermarking algorithms and applications. IEEE Signal Processing Magazine. July 2001 33–46.

    Google Scholar 

  37. C. Podilchuk, W. Zeng.: Image-adaptive watermarking using visual models. (1998).

    Google Scholar 

  38. Sapiro, G.: Geometric Partial Differential Equations and Image Processing. Cambridge University Press, January 2001.

    Google Scholar 

  39. Sethian, J.A.: Level Set Methods and Fast Marching Methods: Evolving Interfaces in Computational Geometry, Fluid Mechanics, Computer Vision, and Materials Science. Cambridge University Press, 1999 Cambridge Monograph on Applied and Computational Mathematics.

    Google Scholar 

  40. Portilla, J., Simoncelli, E.P.: A parametric texture model based on joint statistics of complex wavelet coefficients. International Journal of Computer Vision, 40 (no.1) (2000) p. 49–71.

    Article  MATH  Google Scholar 

  41. Ruderman, D.: The statistics of natural images. Network. 5 (no 4) (1993) 517–548.

    Article  Google Scholar 

  42. Swanson, M., Kobayashi, M. and Tewfik, A.: Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE. 86 (no.6) June 1998 1064–1087.

    Google Scholar 

  43. Simoncelli, E. and Adelson, E.: Subband Transforms In: John Woods (ed.) Subband Image Coding. Kluwer Academic Publishers Norwell MA, 1991 143–192.

    Google Scholar 

  44. Simoncelli, E.P., Olshausen, B.A.: Natural Image Statistics and Neural Representation. Annual Review of Neuroscience, 24 (2001) 1193–1215.

    Article  Google Scholar 

  45. Su, J., Hartung, F., Girod, B.:Channel Model for a Watermark Attack. Proc. Security and Watermarking of Multimedia Contents, San Jose, CA, SPIE, 3657 January 1999 159–170.

    Google Scholar 

  46. Voyatzis, G. and Pitas, I.: The use of watermarks in the protection of digital multimedia products. Proceeding of the IEEE 87 (no.7) July 1999 1197–1207.

    Google Scholar 

  47. Wolfgang, R. and Podilchuk, C.:Perceptual watermarks for digital images and video. Proceeding of the IEEE. 87 (no.7) July 1999 1108–1126.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Flesia, A.G., Donoho, D.L. (2003). Implications for Image Watermarking of Recent Work in Image Analysis and Representation. In: Kim, H.J. (eds) Digital Watermarking. IWDW 2002. Lecture Notes in Computer Science, vol 2613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36617-2_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-36617-2_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-01217-7

  • Online ISBN: 978-3-540-36617-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics