Skip to main content

Image Watermarking for Copyright Protection

  • Chapter
  • First Online:
Algorithm Engineering and Experimentation (ALENEX 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1619))

Included in the following conference series:

  • 2188 Accesses

Abstract

In this paper we provide a description of the application of digital watermarking for use in copyright protection of digital images. The watermarking process we consider involves embedding visually imperceptible data in a digital image in such a way that it is difficult to detect or remove, unless one possesses specific secret information. The major processes involved in the watermarking processes are considered, including insertion, attack, and detection/extraction. Generic features of these processes are discussed, along with open issues, and areas where experimentation is likely to prove useful.

Supported in part by the Spanish Ministry of Education while on sabbatical at the Departamento de Tecnologías de las Comunicaciones, Universidad Carlos III de Madrid, Leganés-Madrid.

Supported in part by Prometheus, Inc., 103 Mansfield St., Sharon, MA

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. J. Anderson. The role of experiment in the theory of algorithms. In 5th DIMACS Challenge Workshop: Experimental Methodology Day, Rutgers University, Oct. 1996. http://www.cs.amherst.edu/~dsj/methday.html.

  2. R. J. Anderson. Stretching the limits of steganography. In Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 39–48. Springer-Verlag, 1996.

    Google Scholar 

  3. M. F. Barnsley and L. P. Hurd. Fractal Image Compression. AK Peters, Ltd., Wellesley, MA, 1993.

    MATH  Google Scholar 

  4. W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal, 35(3&4), 1996. http://www.almaden.ibm.com/journal/sj/mit/sectiona/bender.pdf.

  5. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute, May 1995. http://www.neci.nj.nec.com/tr/index.html.

  6. S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. Can invisible watermarks resolve rightful ownership. Technical Report RC20509, IBM Research Report, July 1996.

    Google Scholar 

  7. S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. Can invisible watermarks resolve rightful ownership. In Proceedings SPIE Storage and Retrieval for Image and Video Databases V, July 1997.

    Google Scholar 

  8. S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. Technical trials and legal tribulations. CACM, 41(7):45–54, July 1998.

    Google Scholar 

  9. Digimarc Homepage. http://www.digimarc.com.

  10. J. R. Hernández, F. Pérez-González, J. M. Rodríguez, and G. Nieto. Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images. to appear in IEEE Journal on Selected Areas in Communication.

    Google Scholar 

  11. J. R. Hernández, F. Pérez-González, J. M. Rodríguez, and G. Nieto. Coding and synchronization: A boost and a bottleneck for the development of image watermarking. In Cost #254 Workshop on Intelligent Communications, L’Aquila, Italy, June 1998.

    Google Scholar 

  12. L. Irwin, G. L. Heileman, C. E. Pizano, C. T. Abdallah, and R. Jordán. The robustness of digital image watermarks. In Proceedings of the International Conference on Imaging Science, Systems, and Technology, pages 82–85, Las Vegas, NV, July 1998.

    Google Scholar 

  13. D. Kahn. The Codebreakers. MacMillan, New York, 1967.

    Google Scholar 

  14. D. Kahn. The history of steganography. In R. Anderson, editor, Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 183–206. Springer-Verlag, 1996.

    Google Scholar 

  15. A. Kerckhoffs. La cryptographie militaire. Journal des Sciences Militaires, IX:5–38 (Jan), 161–191 (Feb), 1883.

    Google Scholar 

  16. E. Koch and J. Zhao. Towards robust and hidden image copyright labelling. In Proceedings of the IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, June 1995.

    Google Scholar 

  17. M. Kutter, F. Jordan, and F. Bossen. Digital signature of color images using amplitude modulation. Journal of Electronic Imaging, 7(2):326–332, 1998.

    Article  Google Scholar 

  18. J. S. Lim. Two-Dimensional Signal and Image Processing. Prentice Hall, Englewood Cliffs, New Jersey, 1990.

    Google Scholar 

  19. F. Mintzer, G. W. Braudaway, and A. E. Bell. Opportunities for watermarking standards. CACM, 41(7):57–64, 1998.

    Google Scholar 

  20. B. M. Moret. Towards a discipline of experimental algorithmics. In 5th DIMACS Challenge Workshop: Experimental Methodology Day, Rutgers University, Oct. 1996. http://www.cs.amherst.edu/~dsj/abstract.moret.

  21. N. Nikolaidis and I. Pitas. Copyright protection of images using robust digital signatures. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, pages 2168–2171, Atlanta, GA, May 1996. http://poseidon.csd.auth.gr/signatures/.

  22. F. A. Petitcolas. Image watermarking: Weaknesses of existing schemes. http://www.cl.cam.ac.uk/~fapp2/watermarking/image_watermarking/.

  23. F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems. In Proceedings Second International Workshop on Information Hiding, Lecture Notes in Computer Science, Portland, Oregon, April 1998. Springer-Verlag. http://www.cl.cam.ac.uk/~fapp2/papers/ih98-attacks/.

    Google Scholar 

  24. B. Pfitzmann. Information hiding terminology. In Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 347–350. Springer-Verlag, 1996.

    Google Scholar 

  25. C. E. Pizano and G. L. Heileman. A GIF watermarking technique based on inveriant measures. In Proceedings of the International Conference on Imaging Science, Systems, and Technology, pages 60–67, Las Vegas, NV, July 1998.

    Google Scholar 

  26. M. Schneider and S.-F. Chang. A content-based approach to image signature generation and authentication. In International Conference on Image Processing, volume III, pages 227–230, Sept 1996.

    Google Scholar 

  27. B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley & Sons, New York, 2nd edition, 1996.

    MATH  Google Scholar 

  28. G. J. Simmons. Contemporary Cryptography: The Science of Information Integrity. IEEE Press, New York, 1992.

    MATH  Google Scholar 

  29. T. G. Stockham, Jr. Image processing in the context of a visual model. Proceedings of the IEEE, 60:828–842, 1972.

    Article  Google Scholar 

  30. M. D. Swanson, M. Kobayashi, and A. H. Tewfik. Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE, 86(6):1064–1087, 1998.

    Article  Google Scholar 

  31. A. Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W. J. Ho, N. Mee, and C. F. Osborne. Electronic watermark. In Digital Image Computing, Technology and Applications, pages 666–673, 1993.

    Google Scholar 

  32. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark. In International Conference on Image Processing, volume 2, pages 86–90, Austin, TX, Nov 1994.

    Google Scholar 

  33. R. B. Wolfgang and E. J. Delp. A watermark for digital images. In International Conference on Image Processing, pages 219–222, Sept 1996.

    Google Scholar 

  34. R. B. Wolfgang and E. J. Delp. A watermarking technique for digital imagery: Further studies. In International Conference on Imaging, Systems, and Technology, pages 279–287, June 1997.

    Google Scholar 

  35. J. Zhao. The unZign homepage. http://www.altern.org/watermark/.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Heileman, G.L., Pizano, C.E., Abdallah, C.T. (1999). Image Watermarking for Copyright Protection. In: Goodrich, M.T., McGeoch, C.C. (eds) Algorithm Engineering and Experimentation. ALENEX 1999. Lecture Notes in Computer Science, vol 1619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48518-X_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-48518-X_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66227-3

  • Online ISBN: 978-3-540-48518-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics