Skip to main content

A secure, robust watermark for multimedia

  • Conference paper
  • First Online:
Book cover Information Hiding (IH 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1174))

Included in the following conference series:

Abstract

We describe a digital watermarking method for use in audio, image, video and multimedia data. We argue that a watermark must be placed in perceptually significant components of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modification of these components can lead to perceptual degradation of the signal. To avoid this, we propose to insert a watermark into the spectral components of the data using techniques analogous to spread sprectrum communications, hiding a narrow band signal in a wideband channel that is the data. The watermark is difficult for an attacker to remove, even when several individuals conspire together with independently watermarked copies of the data. It is also robust to common signal and geometric distortions such as digital-to-analog and analog-to-digital conversion, resampling, and requantization, including dithering and recompression and rotation, translation, cropping and scaling. The same digital watermarking algorithm can be applied to all three media under consideration with only minor modifications, making it especially appropriate for multimedia products. Retrieval of the watermark unambiguously identifies the owner, and the watermark can be constructed to make counterfeiting almost impossible. Experimental results are presented to support these claims.

Authors in alphabetical order

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E. H. Adelson. Digital signal encoding and decoding apparatus. Technical Report 4,939,515, United States Patent, 1990.

    Google Scholar 

  2. W. Bender, D. Gruhl, and N. Morimoto. Techniques for data hiding. In Proc. of SPIE, volume 2420, page 40, February 1995.

    Google Scholar 

  3. Dan Boneh and James Shaw. Collusion-secure fingerprinting for digital data. In Advances in Cryptology: Proceedings, CRYPTO '95. Springer-Verlag, 1995.

    Google Scholar 

  4. J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman. Electronic marking and identification techniques to discourage document copying. In Proc. of Infocom'94, pages 1278–1287, 1994.

    Google Scholar 

  5. G. Caronni. Assuring ownership rights for digital images. In Proc. Reliable IT Systems, VIS'95. Vieweg Publishing Company, 1995.

    Google Scholar 

  6. I. J. Cox, S. Roy, and S. L. Hingorani. Dynamic histogram warping of images pairs for constant image brightness. In IEEE Int, Conf. on Image Processing, 1995.

    Google Scholar 

  7. O. Faugeras. Three Dimensional Computer Vision: A Geometric Viewpoint. MIT Press, 1993.

    Google Scholar 

  8. Allen Gersho and Robert Gray. Vector Quantization and Signal Compression. Kluwer Academic Publishers, Boston, 1992.

    Google Scholar 

  9. R. C. Gonzalez and R. E. Woods. Digital Image Processing. Addison-Wesley, 1993.

    Google Scholar 

  10. P. J. Huber. Robust Statistics. John Wiley and Sons, 1981.

    Google Scholar 

  11. N. Jayant, J. Johnston, and R. Safranek. Signal compression based on models of human perception. Proc IEEE, 81(10), 1993.

    Google Scholar 

  12. E. Koch, J. Rindfrey, and J. Zhao. Copyright protection for multimedia data. In Proc. of the Int. Conf. on Digital Media and Electronic Publishing, 1994.

    Google Scholar 

  13. E. Koch and Z. Zhao. Towards robust and hidden image copyright labeling. In Proceedings of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, June 1995.

    Google Scholar 

  14. F. T. Leighton and S. Micali. Secret-key agreement without public-key cryptography. In Proceedings of Crypto, 1993.

    Google Scholar 

  15. J.S Lim. Two-Dimensional Signal Processing. Prentice Hall, Englewood Cliffs, N.J., 1990.

    Google Scholar 

  16. B. M. Macq and J-J Quisquater. Cryptology for digital tv broadcasting. Proc. of the IEEE, 83(6):944–957, 1995.

    Google Scholar 

  17. K. Matsui and K. Tanaka. Video-steganography. In IMA Intellectual Property Project Proceedings, volume 1, pages 187–206, 1994.

    Google Scholar 

  18. R. L. Pickholtz, D. L. Schilling, and L. B. Millstein. Theory of spread spectrum communications — a tutorial. IEEE Trans. on Communications, pages 855–884, 1982.

    Google Scholar 

  19. W. F. Schreiber, A. E. Lippman, E. H. Adelson, and A. N. Netravali. Receiver-compatible enhanced definition television system. Technical Report 5,010,405, United States Patent, 1991.

    Google Scholar 

  20. K. Tanaka, Y. Nakamura, and K. Matsui. Embedding secret information into a dithered multi-level image. In Proc, 1990 IEEE Military Communications Conference, pages 216–220, 1990.

    Google Scholar 

  21. L. F. Turner. Digital data security system. Patent IPN WO 89/08915, 1989.

    Google Scholar 

  22. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark. In Int. Conf. on Image Processing, volume 2, pages 86–90. IEEE, 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ross Anderson

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cox, I.J., Kilian, J., Leighton, T., Shamoon, T. (1996). A secure, robust watermark for multimedia. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_41

Download citation

  • DOI: https://doi.org/10.1007/3-540-61996-8_41

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61996-3

  • Online ISBN: 978-3-540-49589-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics