Abstract
Watermarking typically involves adding one sequence to another to produce a new sequence containing hidden information. This method is based on modifying a distribution, obtained via segmentation, to hide information, thus allowing subsets of the distribution to still potentially reveal the watermark. We use vector quantization to segment a colour image and then shift each distribution by a random amount. The result is that we can detect a watermark without pre-processing because only comparisons between distributions are needed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, no. 3&4, 1996.
G. Brisbane, R. Safavi-Naini, and P. Ogunbona, “Region-based watermarking for images,” in ISW: International Workshop on Information Security, LNCS, 1999.
D. Coltuc and P. Bolon, “Watermarking by histogram specification,” in Security and Watermarking of Multimedia Contents(P. W. Wong and E. J. Delp, eds.), vol. 3657 of Proceedings of SPIE, pp. 252–263, Society of Photo-optical Instrumentation Engineers (SPIE), 1999.
W. J. Conover, Practical Nonparametric Statistics. John Wiley and Sons, 1999.
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum water-marking for multimedia,” NEC Research Institute, Technical Report 95–10, 1995.
A. Gersho and R. M. Gray, Vector Quantization and Signal Compression. Kluwer Academic Publishers, 1992.
M. Kutter, S. Bhattacharjee, and T. Ebrahimi, “Towards second generation wa-termarking schemes,” in Proceedings of the 6th International Conference on Image Processing, vol. 1, pp. 320–323, Oct. 1999.
M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” in Security and Watermarking of Multimedia Contents (P. W. Wong and E. J. Delp, eds.), vol. 3657, (San Jose, California, U.S.A.), pp. 226–239, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE, 25-27 Jan. 1999.
C.-Y. Lin, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, “Rotation, scale, and translation resilient public watermarking for images,” in Security and Wa-termarking of Multimedia Contents II (P. W. Wong and E. J. Delp, eds.), vol. 3971 of Proceedings of SPIE, pp. 90–98, Society of Photo-optical Instrumentation Engineers (SPIE), 2000.
J. J. K. Ó Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, vol. 66, pp. 303–317, May 1998. European Association for Signal Processing (EURASIP).
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, pp. 1062–1078, July 1999.
M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brisbane, G., Safavi-Naini, R., Ogunbona, P. (2000). Region-Based Watermarking by Distribution Adjustment. In: Goos, G., Hartmanis, J., van Leeuwen, J., Pieprzyk, J., Seberry, J., Okamoto, E. (eds) Information Security. ISW 2000. Lecture Notes in Computer Science, vol 1975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44456-4_5
Download citation
DOI: https://doi.org/10.1007/3-540-44456-4_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41416-2
Online ISBN: 978-3-540-44456-5
eBook Packages: Springer Book Archive