Skip to main content

Robust Watermarking in Slides of Presentations by Blank Space Coloring: A New Approach

  • Chapter
  • 274 Accesses

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 5510))

Abstract

A new robust method to embed imperceptibly a watermark image into the slides of a presentation is proposed. The watermark is partitioned into blocks and embedded into the space characters existing in the slides in a repeating pseudo-random sequence. The embedding is achieved by changing the colors of the space characters into new ones which are results of encoding the contents and indices of the blocks. The embedded watermark is resilient against many common modifications on slides, including copying and pasting of slides; insertion, deletion and reordering of slides; slide design changes; and file format conversions. A security key is used during embedding and extraction of a watermark, such that if an offending presentation contains slides taken from presentations watermarked with different security keys, each watermark can be extracted reliably in turn with the respective key using a weighted voting scheme also proposed in this study. Experiments conducted in Microsoft PowerPoint confirm the feasibility of the proposed method. On average, a recognizable watermark of size 64×64 can be extracted from a presentation containing five watermarked slides. The proposed method is useful for various applications of information hiding involving slides, including slide copyright protection, slide authentication, covert communication through slides, etc.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding – a survey. Proceedings of IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  2. Johnson, N.F., Duric, Z., Jajodia, S.: Information hiding: steganography and watermarking: attacks and countermeasures. Advances in information security, vol. 1, p. 137. Kluwer Academic Publishers, Dordrecht (2001)

    Book  Google Scholar 

  3. Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. EURASIP Journal on Applied Signal Processing 2002(2), 126–132 (2002)

    Article  MATH  Google Scholar 

  4. Lin, C.Y., Wu, M., Bloom, J.A., Cox, I.J., Miller, M.L., Lui, Y.M.: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Processing 10(5), 767–782 (2001)

    Article  MATH  Google Scholar 

  5. Ó Ruanaidh, J.J.K., Pun, T.: Rotation, translation and scale invariant digital image watermarking. In: IEEE Signal Processing Society 1997 International Conference on Image Processing (ICIP 1997), Santa Barbara, California (1997)

    Google Scholar 

  6. Brassil, J.T., Low, S., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. Proceedings of IEEE 87(7), 1181–1196 (1999)

    Article  Google Scholar 

  7. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24(9-10), 1613–1626 (2003)

    Article  MATH  Google Scholar 

  8. Solachidis, V., Pitas, I.: Watermarking polygonal lines using fourier descriptors. IEEE Computer Graphics and Applications 24(3), 44–51 (2004)

    Article  Google Scholar 

  9. Microsoft: Microsoft Office 1997 Visual Basic: programmer’s guide. Microsoft, Redmond (1997)

    Google Scholar 

  10. Muterspaugh, M., Liu, H., Gao, W.: Thomson proposal outline for WRAN, proposal for IEEE P802.22 Wireless RANs, doc.: IEEE802.22-05/0096r1 (November 2005)

    Google Scholar 

  11. Tseng, S.S., Tsai, W.H.: High confidence information systems mid-term report, NSC advanced technologies and applications for next generation information networks (October 2002)

    Google Scholar 

  12. Xilinx: Digital filtering, DSP design flow (2003), http://users.ece.gatech.edu/~hamblen/4006/xup/dsp_flow/slides/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Liu, TY., Tsai, WH. (2009). Robust Watermarking in Slides of Presentations by Blank Space Coloring: A New Approach. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security IV. Lecture Notes in Computer Science, vol 5510. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01757-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01757-5_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01756-8

  • Online ISBN: 978-3-642-01757-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics