Skip to main content
Log in

Introduction au tatouage d’images

Introduction to image watermarking

  • Published:
Annales Des Télécommunications Aims and scope Submit manuscript

Résumé

Cet article introduit la notion de tatouage en sécurité d’images et détaille la forme de tatouage la plus étudiée, à savoir: invisible et robuste pour la protection des droits d’auteur, plus connue sous le mot clé “watermarking”. Les critères à considérer sont précisés pour construire un tatoueur performant en termes de compromis ratio, visibilité et robustesse. Le besoin ou non de recourir à des informations originales pour extraire la marque est également discuté. Plusieurs algorithmes sont détaillés, et on introduit les notions de base fréquemment utilisées. Cet article précise, en outre, les limites actuelles du tatouage.

Abstract

In this paper, we introduce the concept of digital watermarking in the field of image security. We describe in detail the most popular form of watermarking, that is to say: invisible and robust for the copyright. We deal with the criteria required to build an efficient watermarking scheme in terms of ratio, visibility and robustness. The necessity or not of using original information to recover the watermark is also addressed. We then present some algorithms, and introduce basic key techniques frequently used. We conclude this article by indicating the current limits of watermarking.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Bibliographie

  1. *** http://www.patents.ibm.com

  2. Swanson (M.), Kobayashi (M.), Tewfik (H.). Multimedia data embedding and watermarking technologies.Proc. IEEE,86, n° 6, (1998).

  3. Hartung (F.), Kutter (M.). Multimedia watermarking techniques.Proc. IEEE,87, n° 7, (July 1999).

  4. Delaigle (J.-F.), De Vleeschouwer (C.), Macq Watermarking using a matching model based on the human visual system.École thématique CNRS GDR-PRC ISIS: Information Signal Images Marly, le Roi, (1997).

  5. Kerckhoffs (A.). La crytographie militaire.Journal des Sciences militaires,9, pp. 5–38, (1883).

    Google Scholar 

  6. Roche (S.), Dugelay (J.-L.). Mécanismes de sécurité liés à la transmission des images.CORESA, Paris, (1997).

  7. Barni (M.), Bartolini (F.), De Rosa (A.), Piva (A.). Capacity of the watermarking-channel: how many bits can be hidden within a digital image?Proc. of SPIE, Security and Watermarking of Multimedia Contents, Electronic Imaging ’99,3657, San Jose CA USA, (Jan. 1999).

  8. Smith (J.), Comiskey Modulation and information hiding in images.Proc. of the First International Workshop on Information Hiding, Springer Lecture Notes in Computer Science,1174, pp. 207–227, (1996).

    Google Scholar 

  9. Clark (G. C.), Cain (J. B.). Error correction coding for digital communication.Plenum Press (1988).

  10. Darmstaedter (V.), Delaigle (J.-F.), Nicholson (D.), Macq A block based watermarking technique for mpeg-2 signals: optimization and validation on real digital TV distribution links.Proc. European Conference on Multimedia Applications, Services and Techniques (ECMAST), (1998).

  11. Tirkel (A.Z.) et al. Digital image computing, technology and applications, (1993).

  12. Cox (I. J.) et al. Secure spread spectrum watermarking for multimedia,IEEE Transactions Image Processing,6, n° 12, pp. 1673–1687,(1997).

    Article  Google Scholar 

  13. Lee (D.). Call for contributions for jpeg 2000: image coding system.ISO/IEC JTC1/SC29/WG1 N505, (1997).

  14. *** MPEG-4 Requirements Group - CfP for identification and protection of contentin MPEG-4. ISO document JTC1/SC29/WG11 N1714, (1997).

  15. *** Watermarking for dvd - CfP -http://www.dvcc.com/dhsg/ (1997).

  16. ***Digimarc Corp. identify, manage and track your images. http://www.digimarc.com/ (1998).

  17. *** SureSign from signum.www.signumtech.com.

  18. *** EikonMark.www.generation.net/~pitas/sign.html

  19. Jordan (F.), Kutter (M.). R&D software: jk_pgs. http://ltssg3.epfl.ch:1248/kutter/watermarking/~pgs.

  20. ***Giovanni from bluespike, http://www.bluespike.com/giovanni/gdigmark.html (1998).

  21. *** Signafy from NEC.www.informix.com

  22. *** MediaSec technologies LLC. software: Syscop, http://www.mediasec.com.

  23. Petitcolas (F.), Anderson (R. J.). Weaknesses of copyright marking systems.ACM MM (1998).

  24. ***Projet rnrt Aquamars.http://www.telecom.gouv.fr/rnrt/wprojets.htm (1998).

  25. Mintzer (F.), Braudaway (G. W.), Yeung (M.). Effective and ineffective digital watermarks.IEEE Int. Conf. on Image Proc. ICIP, pp. 9–12, (1997).

  26. Maitre (H.). Image watermarking: why is watermarking a hard problem?Proc. Korea-France Workshop on Multimedia, (1998).

  27. Roche (S), Dugelay (J.-L), Molva (R.). Multi resolution access control algorithm based on fractal coding.IEEE Int. Conf. on Image Proc. -ICIP, Lausanne, Switzerland, (September 16-19, 1996).

  28. Yeung (M. M.), Mintzer (F.). An invisible watermarking technique for image verification.IEEE Int. Conf. on Image Procèssing, pp. 680–683, (1997).

  29. Swanson (M. D.), Zhu Tewfik (A.). Multiresolution scene-based video watermarking using perceptual models.IEEE journal on Selected areas in communications,16, n° 4, pp. 540–550, (May 1998).

    Article  Google Scholar 

  30. Bortolini (F.), Barni (M.), Cappellini (V.), Piva (A.). Mask building for perceptually hiding frequency embedded watermarks.Proc. of the Int. Conf. on Image Processing (ICIP’98),1, Chicago, Illinois, US, pp. 450–454, (October 1998).

    Google Scholar 

  31. *** unZign. Is your watermark secure?http://www.altern.org/watermark/

  32. Petitcolas (F.), Kuhn (M.). StirMark 2 - image watermarking robustness test,http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/ (1997).

  33. Bender (W.), Gruhl (D.), Morimoto (N.). Techniques for data hiding.Proc. of the SPIE (1995).

  34. Kutter (M.), Jordan (F.), Bossen (F.). Digital signature of color images using amplitude modulation inProceedings of SPIE Storage and Retrieval for Image and Video Databases, San Jose, USA, (Feb. 13–14 1997).

  35. Bruyndonckx (O.), Quisquater (J.-J.), Macq Spatial method for copyright labeling of digital images.IEEE Workshop on Nonlinear Signal and Image Processing - NSIP, pp. 456–459, (1995).

  36. Rao (K. R.), Yip (P.). Discrete cosine transform: algorithms, advantages, applications.Academic Press Inc., (1990).

  37. Pennebaker (W. B.), Mitchell (J. L.). jpeg still image data compression standard.Van Nostrand Reinhold Company (1992).

  38. Koch (E.), Zhao (J.). Towards robust and hiden image copyright labeling.IEEE Workshop on Nonlinear Signal and Image Processing - NSIP (1995).

  39. *** Talisman Acts Project AC019F.http://nsl.tele.ucl.ac.be/TAL1SMAN/ (1998).

  40. Vetterli (M.), Kovacevic (J.). Wavelets and subband coding.Prentice Hall, (1995).

  41. Fisher (Y.), Fractal image compression: theory and application to digital images,Springer Verlag, NY, (1994).

    Google Scholar 

  42. O’ruanaidh (J. J.), Pun (T.). Rotation, translation and scale invariant digital image watermarking.IEEE Signal Processing Society 1997 Int. Conf. on Image Processing - ICIP, Santa Barbara, CA, (1997).

  43. Wang (H.-J.), Kuo (C.-C. J). Image protection via watermarking on perceptually significant wavelet coefficients.IEEE MultiMedia Signal Processing -, MMSP, L. A., CA, pp. 279–284, (1998).

    Google Scholar 

  44. Dugelay (J.-L.). Technique of hiding and retrieval, in particular using fractals, of a digital information inside a multimedia document.Brevet FR 98 04 083 (in French).

  45. Dugelay (J.-L.), Roche (S.). Method of marking a multimedia document, such as an image, by generating a mark.Brevets FR 98 07 607 et FR 99 02 154.

  46. Roche (S.), Dugelay (J.-L.). Image watermarking based on the fractal transform.IEEE MutliMedia Signal Processing - MMSP, L. A., CA, pp. 358–362, (1998).

    Google Scholar 

  47. Jacquin (A. E.), Image coding based on a fractal theory of iterated contractive image transformations,IEEE Trans. on Image Proc.,2, n° l, pp. 18–30, (1992).

    Article  Google Scholar 

  48. Polidori (E.), Dugelay (J.-L.). Zooming using i.f.s.,Fractals,5, Supplementary Issue, pp. 111–123, (1997).

    Article  Google Scholar 

  49. Wu (J. K.) et al., A fractal-based clustering approach in large visual database systems,Multimedia Tools and Applications,3, pp. 225–244, (1996).

    Article  MATH  Google Scholar 

  50. Vissac (M.), Dugelay (J.-L.), Rose (K.). A fractal-inspired approach to content-based image indexing.IEEE ICIP 99, Kobe, Japan, (October 25-28, 1999).

  51. Hartung (F.), Girod Digital watermarking of raw and compressed video.Proc. European EOS/SPIE Symposium on Advanced Imaging and Network Technologies, (1996).

  52. Hartung (F.), Girod Digital watermarking of mpeg-2 coded video in the bitstream domain.IEEE ICASSP (1997).

  53. Hartung (F.), Girod Fast public-key watermarking of compressed video.IEEE ICIP, pp. 528–531, (1997).

  54. Kalker (T.), Linnartz (J.-P.). Improved watermark detection reliability using filtering before correlation.Proc. IEEE Int. Conf. on Image Processing, (1998).

  55. Kutter (M.). Watermarking resisting to translation, rotation and scaling.Proc. of SPIE,3528, pp. 423–431, Boston USA, (Nov. 1998).

    Article  Google Scholar 

  56. Matsui (K.), Tanaka (K.), Video-steganography: how to secretly embed a signature in a picture.Journal of the interactive Multimedia Association Intellectual Property Project,1, pp. 187–206, (1994).

    Google Scholar 

  57. Jordan (F.), Vynne (T.). Motion vector watermarking.LTS EPFL, Patent, (1997).

  58. Kutter (M.), Petitcolas (F.). A fair benchmark for image watermarking systems.Proceedings of SPIE 99,3657, (January 1999).

  59. Macq Delannay (D.), Boucqueau (J.-M.). Infrastructures de sécurité pour la transmission des images.CORESA 99, Sophia Antipolis, (juin 99).

  60. Barnet (R.). Laplacian removal attack (stirmark v2.2).http://www. cl. cam.ac. uk/~fapp2/watermarking/stirmark/

  61. Craver (S.), Memon (N.), Yeo (B. L.), Yeung (M.). Can invisible watermarks resolve rightful ownerships?Proc. of SPIE,3022, pp. 310–321,(1997).

    Article  Google Scholar 

  62. Gordon (J.). The story of Alice and Bob.http://www.conceptlabs.co.uk/alicebob.html. Zurich, (1984).

  63. Boneh (D.), Shaw (J.). Collusion-secure fingerprinting for digital data.IEEE Trans, on Information Theory,44, n° 5, (1998).

  64. Linnartz (J.-P.), Van Dijk (M.). Analysis of the sensitivity attack against electronic watermarks in images information hiding:Second International Workshop, Portland,1525 ofLecture Notes in Computer Science, pp. 258–272, (1998).

    Article  Google Scholar 

  65. Jordan (F.), Kutter (M.), Ebrahimi (T.). Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video.ISO/IEC JTC1/SC29/WG11 MPEG97I, (July 1997).

  66. Bloom (J. A.) et al. Copy protection for DVD video.Proceedings of the IEEE,87, n° 7, (July 1999).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jean-Luc Dugelay.

Additional information

Les activitéswatermarking de l’Institut Eurécom sont en partie soutenues par la dga, France Télécom et Thomson-CSF.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Dugelay, JL., Roche, S. Introduction au tatouage d’images. Ann. Télécommun. 54, 427–437 (1999). https://doi.org/10.1007/BF02996385

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02996385

Mots clés

Key words

Navigation