Skip to main content

A Lattice Based General Blind Watermark Scheme

  • Conference paper
  • 738 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2836))

Abstract

Digital watermark is a very active research area that has received a considerable amount of attention in many multimedia applications. For most watermark applications, it is often desired to retrieve the embedded information without access to the host data; this is known as blind watermark. Most of previous blind watermark schemes either suffer significantly from host data interference or require expense of storage. Therefore, simple and effective blind watermark scheme is expected urgently. In this paper, we attempt to resolve the question. Here, a lattice based general blind watermark scheme is proposed. The host data interference is eliminated entirely and only a little of cost of storage is needed. Thus, it has considerable advantage over previously proposed schemes. Experimental results demonstrated the power of this scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Proceedings of the SPIE/IS&T International Conference on Security and Watermarking of Multimedia Contents, vol. 3657, January 25–27 (1999)

    Google Scholar 

  2. Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents IV, vol. 4675, January 20–25, San Jose, CA (2002)

    Google Scholar 

  3. Anderson, R. (ed.) IH 1996. LNCS, vol. 1174. Springer, Heidelberg (1996) ISBN 3-540-61996-8

    Google Scholar 

  4. Moskowitz, I.S. (ed.): IH 2001. LNCS, vol. 2137. Springer, Heidelberg (2001)

    Google Scholar 

  5. Basar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory. SIAM Classics in Applied Mathematics. SIAM, Philadelphia (1999)

    MATH  Google Scholar 

  6. Moulin, P., Ivanovic, A.: The Watermark Selection Game. In: Proc. Conference on Information Science and Systems, Baltimore, MD (March 2001)

    Google Scholar 

  7. Fiat, A., Tassa, T.: Dynamic Traitor Tracing. Journal of Cryptology 14, 211–223 (2001)

    MATH  MathSciNet  Google Scholar 

  8. Zeng, W., Liu, B.: On resolving rightful ownership of digital images by invisible watermark. In: Proc. IEEE Conf. Image Processing, CA, October 1997, vol. 1, pp. 552–555 (1997)

    Google Scholar 

  9. Chen, B., Wornell, G.W.: Provably robust digital watermark. In: Proc of SPIE: Multimedia Systems and Applications, vol. 3845, pp. 43–54 (1999)

    Google Scholar 

  10. Chen, B., Wornell, G.W.: An information theoretic approach to design of robust digital watermarking systems. In: Proceedings of the International Conference on Acoustics, Speech and Signal Proceeding (ICASSP), Phoenix, AZ (March 1999)

    Google Scholar 

  11. Costa, M.H.M.: Writing on Dirty Paper. IEEE Trans. on Information Theory 29(3), 439–441 (1983)

    Article  MATH  Google Scholar 

  12. Eggers, J., Su, J.K.: Performance of a pratical blind watermarking scheme. In: Proceedings of SPIE, vol. 4314 (2001)

    Google Scholar 

  13. Chou, J., Pradhan, S., Ramchandran, K.: A Robust Blind Watermarking Scheme based on Distriibuted Source Coding Pronciples. In: Proceedings of SPIE (2000)

    Google Scholar 

  14. Moulin, P.: The role of information theory in watermarking and its application to image watermarking. Signal Processing 81, 1121–1139 (2001)

    Article  MATH  Google Scholar 

  15. Jayant, N.J., Johnston, J., Safranek, R.: Signal compression based on models of the human perception. Proc. IEEE 81, 1385–1422 (1993)

    Article  Google Scholar 

  16. Miyazaki, A., Okamoto, A.: Analysis of watermarking systems in the frequency domain and its application to design of rubust watermarking systems. IEICE Trans. 85(1), 117–124 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Y., Gao, W., Wang, Z., Liu, S. (2003). A Lattice Based General Blind Watermark Scheme. In: Qing, S., Gollmann, D., Zhou, J. (eds) Information and Communications Security. ICICS 2003. Lecture Notes in Computer Science, vol 2836. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39927-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39927-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20150-2

  • Online ISBN: 978-3-540-39927-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics