Abstract
In this paper we provide a description of the application of digital watermarking for use in copyright protection of digital images. The watermarking process we consider involves embedding visually imperceptible data in a digital image in such a way that it is difficult to detect or remove, unless one possesses specific secret information. The major processes involved in the watermarking processes are considered, including insertion, attack, and detection/extraction. Generic features of these processes are discussed, along with open issues, and areas where experimentation is likely to prove useful.
Supported in part by the Spanish Ministry of Education while on sabbatical at the Departamento de TecnologÃas de las Comunicaciones, Universidad Carlos III de Madrid, Leganés-Madrid.
Supported in part by Prometheus, Inc., 103 Mansfield St., Sharon, MA
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. J. Anderson. The role of experiment in the theory of algorithms. In 5th DIMACS Challenge Workshop: Experimental Methodology Day, Rutgers University, Oct. 1996. http://www.cs.amherst.edu/~dsj/methday.html.
R. J. Anderson. Stretching the limits of steganography. In Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 39–48. Springer-Verlag, 1996.
M. F. Barnsley and L. P. Hurd. Fractal Image Compression. AK Peters, Ltd., Wellesley, MA, 1993.
W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal, 35(3&4), 1996. http://www.almaden.ibm.com/journal/sj/mit/sectiona/bender.pdf.
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute, May 1995. http://www.neci.nj.nec.com/tr/index.html.
S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. Can invisible watermarks resolve rightful ownership. Technical Report RC20509, IBM Research Report, July 1996.
S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. Can invisible watermarks resolve rightful ownership. In Proceedings SPIE Storage and Retrieval for Image and Video Databases V, July 1997.
S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. Technical trials and legal tribulations. CACM, 41(7):45–54, July 1998.
Digimarc Homepage. http://www.digimarc.com.
J. R. Hernández, F. Pérez-González, J. M. RodrÃguez, and G. Nieto. Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images. to appear in IEEE Journal on Selected Areas in Communication.
J. R. Hernández, F. Pérez-González, J. M. RodrÃguez, and G. Nieto. Coding and synchronization: A boost and a bottleneck for the development of image watermarking. In Cost #254 Workshop on Intelligent Communications, L’Aquila, Italy, June 1998.
L. Irwin, G. L. Heileman, C. E. Pizano, C. T. Abdallah, and R. Jordán. The robustness of digital image watermarks. In Proceedings of the International Conference on Imaging Science, Systems, and Technology, pages 82–85, Las Vegas, NV, July 1998.
D. Kahn. The Codebreakers. MacMillan, New York, 1967.
D. Kahn. The history of steganography. In R. Anderson, editor, Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 183–206. Springer-Verlag, 1996.
A. Kerckhoffs. La cryptographie militaire. Journal des Sciences Militaires, IX:5–38 (Jan), 161–191 (Feb), 1883.
E. Koch and J. Zhao. Towards robust and hidden image copyright labelling. In Proceedings of the IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, June 1995.
M. Kutter, F. Jordan, and F. Bossen. Digital signature of color images using amplitude modulation. Journal of Electronic Imaging, 7(2):326–332, 1998.
J. S. Lim. Two-Dimensional Signal and Image Processing. Prentice Hall, Englewood Cliffs, New Jersey, 1990.
F. Mintzer, G. W. Braudaway, and A. E. Bell. Opportunities for watermarking standards. CACM, 41(7):57–64, 1998.
B. M. Moret. Towards a discipline of experimental algorithmics. In 5th DIMACS Challenge Workshop: Experimental Methodology Day, Rutgers University, Oct. 1996. http://www.cs.amherst.edu/~dsj/abstract.moret.
N. Nikolaidis and I. Pitas. Copyright protection of images using robust digital signatures. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, pages 2168–2171, Atlanta, GA, May 1996. http://poseidon.csd.auth.gr/signatures/.
F. A. Petitcolas. Image watermarking: Weaknesses of existing schemes. http://www.cl.cam.ac.uk/~fapp2/watermarking/image_watermarking/.
F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems. In Proceedings Second International Workshop on Information Hiding, Lecture Notes in Computer Science, Portland, Oregon, April 1998. Springer-Verlag. http://www.cl.cam.ac.uk/~fapp2/papers/ih98-attacks/.
B. Pfitzmann. Information hiding terminology. In Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 347–350. Springer-Verlag, 1996.
C. E. Pizano and G. L. Heileman. A GIF watermarking technique based on inveriant measures. In Proceedings of the International Conference on Imaging Science, Systems, and Technology, pages 60–67, Las Vegas, NV, July 1998.
M. Schneider and S.-F. Chang. A content-based approach to image signature generation and authentication. In International Conference on Image Processing, volume III, pages 227–230, Sept 1996.
B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley & Sons, New York, 2nd edition, 1996.
G. J. Simmons. Contemporary Cryptography: The Science of Information Integrity. IEEE Press, New York, 1992.
T. G. Stockham, Jr. Image processing in the context of a visual model. Proceedings of the IEEE, 60:828–842, 1972.
M. D. Swanson, M. Kobayashi, and A. H. Tewfik. Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE, 86(6):1064–1087, 1998.
A. Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W. J. Ho, N. Mee, and C. F. Osborne. Electronic watermark. In Digital Image Computing, Technology and Applications, pages 666–673, 1993.
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark. In International Conference on Image Processing, volume 2, pages 86–90, Austin, TX, Nov 1994.
R. B. Wolfgang and E. J. Delp. A watermark for digital images. In International Conference on Image Processing, pages 219–222, Sept 1996.
R. B. Wolfgang and E. J. Delp. A watermarking technique for digital imagery: Further studies. In International Conference on Imaging, Systems, and Technology, pages 279–287, June 1997.
J. Zhao. The unZign homepage. http://www.altern.org/watermark/.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Heileman, G.L., Pizano, C.E., Abdallah, C.T. (1999). Image Watermarking for Copyright Protection. In: Goodrich, M.T., McGeoch, C.C. (eds) Algorithm Engineering and Experimentation. ALENEX 1999. Lecture Notes in Computer Science, vol 1619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48518-X_14
Download citation
DOI: https://doi.org/10.1007/3-540-48518-X_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66227-3
Online ISBN: 978-3-540-48518-6
eBook Packages: Springer Book Archive