Skip to main content

Region-Based Watermarking by Distribution Adjustment

  • Conference paper
  • First Online:
Information Security (ISW 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1975))

Included in the following conference series:

  • 325 Accesses

Abstract

Watermarking typically involves adding one sequence to another to produce a new sequence containing hidden information. This method is based on modifying a distribution, obtained via segmentation, to hide information, thus allowing subsets of the distribution to still potentially reveal the watermark. We use vector quantization to segment a colour image and then shift each distribution by a random amount. The result is that we can detect a watermark without pre-processing because only comparisons between distributions are needed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, no. 3&4, 1996.

    Google Scholar 

  2. G. Brisbane, R. Safavi-Naini, and P. Ogunbona, “Region-based watermarking for images,” in ISW: International Workshop on Information Security, LNCS, 1999.

    Google Scholar 

  3. D. Coltuc and P. Bolon, “Watermarking by histogram specification,” in Security and Watermarking of Multimedia Contents(P. W. Wong and E. J. Delp, eds.), vol. 3657 of Proceedings of SPIE, pp. 252–263, Society of Photo-optical Instrumentation Engineers (SPIE), 1999.

    Google Scholar 

  4. W. J. Conover, Practical Nonparametric Statistics. John Wiley and Sons, 1999.

    Google Scholar 

  5. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum water-marking for multimedia,” NEC Research Institute, Technical Report 95–10, 1995.

    Google Scholar 

  6. A. Gersho and R. M. Gray, Vector Quantization and Signal Compression. Kluwer Academic Publishers, 1992.

    Google Scholar 

  7. M. Kutter, S. Bhattacharjee, and T. Ebrahimi, “Towards second generation wa-termarking schemes,” in Proceedings of the 6th International Conference on Image Processing, vol. 1, pp. 320–323, Oct. 1999.

    Google Scholar 

  8. M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” in Security and Watermarking of Multimedia Contents (P. W. Wong and E. J. Delp, eds.), vol. 3657, (San Jose, California, U.S.A.), pp. 226–239, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE, 25-27 Jan. 1999.

    Google Scholar 

  9. C.-Y. Lin, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, “Rotation, scale, and translation resilient public watermarking for images,” in Security and Wa-termarking of Multimedia Contents II (P. W. Wong and E. J. Delp, eds.), vol. 3971 of Proceedings of SPIE, pp. 90–98, Society of Photo-optical Instrumentation Engineers (SPIE), 2000.

    Google Scholar 

  10. J. J. K. Ó Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, vol. 66, pp. 303–317, May 1998. European Association for Signal Processing (EURASIP).

    Google Scholar 

  11. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, pp. 1062–1078, July 1999.

    Google Scholar 

  12. M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Brisbane, G., Safavi-Naini, R., Ogunbona, P. (2000). Region-Based Watermarking by Distribution Adjustment. In: Goos, G., Hartmanis, J., van Leeuwen, J., Pieprzyk, J., Seberry, J., Okamoto, E. (eds) Information Security. ISW 2000. Lecture Notes in Computer Science, vol 1975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44456-4_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-44456-4_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41416-2

  • Online ISBN: 978-3-540-44456-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics