Résumé
Cet article introduit la notion de tatouage en sécurité d’images et détaille la forme de tatouage la plus étudiée, à savoir: invisible et robuste pour la protection des droits d’auteur, plus connue sous le mot clé “watermarking”. Les critères à considérer sont précisés pour construire un tatoueur performant en termes de compromis ratio, visibilité et robustesse. Le besoin ou non de recourir à des informations originales pour extraire la marque est également discuté. Plusieurs algorithmes sont détaillés, et on introduit les notions de base fréquemment utilisées. Cet article précise, en outre, les limites actuelles du tatouage.
Abstract
In this paper, we introduce the concept of digital watermarking in the field of image security. We describe in detail the most popular form of watermarking, that is to say: invisible and robust for the copyright. We deal with the criteria required to build an efficient watermarking scheme in terms of ratio, visibility and robustness. The necessity or not of using original information to recover the watermark is also addressed. We then present some algorithms, and introduce basic key techniques frequently used. We conclude this article by indicating the current limits of watermarking.
Bibliographie
*** http://www.patents.ibm.com
Swanson (M.), Kobayashi (M.), Tewfik (H.). Multimedia data embedding and watermarking technologies.Proc. IEEE,86, n° 6, (1998).
Hartung (F.), Kutter (M.). Multimedia watermarking techniques.Proc. IEEE,87, n° 7, (July 1999).
Delaigle (J.-F.), De Vleeschouwer (C.), Macq Watermarking using a matching model based on the human visual system.École thématique CNRS GDR-PRC ISIS: Information Signal Images Marly, le Roi, (1997).
Kerckhoffs (A.). La crytographie militaire.Journal des Sciences militaires,9, pp. 5–38, (1883).
Roche (S.), Dugelay (J.-L.). Mécanismes de sécurité liés à la transmission des images.CORESA, Paris, (1997).
Barni (M.), Bartolini (F.), De Rosa (A.), Piva (A.). Capacity of the watermarking-channel: how many bits can be hidden within a digital image?Proc. of SPIE, Security and Watermarking of Multimedia Contents, Electronic Imaging ’99,3657, San Jose CA USA, (Jan. 1999).
Smith (J.), Comiskey Modulation and information hiding in images.Proc. of the First International Workshop on Information Hiding, Springer Lecture Notes in Computer Science,1174, pp. 207–227, (1996).
Clark (G. C.), Cain (J. B.). Error correction coding for digital communication.Plenum Press (1988).
Darmstaedter (V.), Delaigle (J.-F.), Nicholson (D.), Macq A block based watermarking technique for mpeg-2 signals: optimization and validation on real digital TV distribution links.Proc. European Conference on Multimedia Applications, Services and Techniques (ECMAST), (1998).
Tirkel (A.Z.) et al. Digital image computing, technology and applications, (1993).
Cox (I. J.) et al. Secure spread spectrum watermarking for multimedia,IEEE Transactions Image Processing,6, n° 12, pp. 1673–1687,(1997).
Lee (D.). Call for contributions for jpeg 2000: image coding system.ISO/IEC JTC1/SC29/WG1 N505, (1997).
*** MPEG-4 Requirements Group - CfP for identification and protection of contentin MPEG-4. ISO document JTC1/SC29/WG11 N1714, (1997).
*** Watermarking for dvd - CfP -http://www.dvcc.com/dhsg/ (1997).
***Digimarc Corp. identify, manage and track your images. http://www.digimarc.com/ (1998).
*** SureSign from signum.www.signumtech.com.
*** EikonMark.www.generation.net/~pitas/sign.html
Jordan (F.), Kutter (M.). R&D software: jk_pgs. http://ltssg3.epfl.ch:1248/kutter/watermarking/~pgs.
***Giovanni from bluespike, http://www.bluespike.com/giovanni/gdigmark.html (1998).
*** Signafy from NEC.www.informix.com
*** MediaSec technologies LLC. software: Syscop, http://www.mediasec.com.
Petitcolas (F.), Anderson (R. J.). Weaknesses of copyright marking systems.ACM MM (1998).
***Projet rnrt Aquamars.http://www.telecom.gouv.fr/rnrt/wprojets.htm (1998).
Mintzer (F.), Braudaway (G. W.), Yeung (M.). Effective and ineffective digital watermarks.IEEE Int. Conf. on Image Proc. ICIP, pp. 9–12, (1997).
Maitre (H.). Image watermarking: why is watermarking a hard problem?Proc. Korea-France Workshop on Multimedia, (1998).
Roche (S), Dugelay (J.-L), Molva (R.). Multi resolution access control algorithm based on fractal coding.IEEE Int. Conf. on Image Proc. -ICIP, Lausanne, Switzerland, (September 16-19, 1996).
Yeung (M. M.), Mintzer (F.). An invisible watermarking technique for image verification.IEEE Int. Conf. on Image Procèssing, pp. 680–683, (1997).
Swanson (M. D.), Zhu Tewfik (A.). Multiresolution scene-based video watermarking using perceptual models.IEEE journal on Selected areas in communications,16, n° 4, pp. 540–550, (May 1998).
Bortolini (F.), Barni (M.), Cappellini (V.), Piva (A.). Mask building for perceptually hiding frequency embedded watermarks.Proc. of the Int. Conf. on Image Processing (ICIP’98),1, Chicago, Illinois, US, pp. 450–454, (October 1998).
*** unZign. Is your watermark secure?http://www.altern.org/watermark/
Petitcolas (F.), Kuhn (M.). StirMark 2 - image watermarking robustness test,http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/ (1997).
Bender (W.), Gruhl (D.), Morimoto (N.). Techniques for data hiding.Proc. of the SPIE (1995).
Kutter (M.), Jordan (F.), Bossen (F.). Digital signature of color images using amplitude modulation inProceedings of SPIE Storage and Retrieval for Image and Video Databases, San Jose, USA, (Feb. 13–14 1997).
Bruyndonckx (O.), Quisquater (J.-J.), Macq Spatial method for copyright labeling of digital images.IEEE Workshop on Nonlinear Signal and Image Processing - NSIP, pp. 456–459, (1995).
Rao (K. R.), Yip (P.). Discrete cosine transform: algorithms, advantages, applications.Academic Press Inc., (1990).
Pennebaker (W. B.), Mitchell (J. L.). jpeg still image data compression standard.Van Nostrand Reinhold Company (1992).
Koch (E.), Zhao (J.). Towards robust and hiden image copyright labeling.IEEE Workshop on Nonlinear Signal and Image Processing - NSIP (1995).
*** Talisman Acts Project AC019F.http://nsl.tele.ucl.ac.be/TAL1SMAN/ (1998).
Vetterli (M.), Kovacevic (J.). Wavelets and subband coding.Prentice Hall, (1995).
Fisher (Y.), Fractal image compression: theory and application to digital images,Springer Verlag, NY, (1994).
O’ruanaidh (J. J.), Pun (T.). Rotation, translation and scale invariant digital image watermarking.IEEE Signal Processing Society 1997 Int. Conf. on Image Processing - ICIP, Santa Barbara, CA, (1997).
Wang (H.-J.), Kuo (C.-C. J). Image protection via watermarking on perceptually significant wavelet coefficients.IEEE MultiMedia Signal Processing -, MMSP, L. A., CA, pp. 279–284, (1998).
Dugelay (J.-L.). Technique of hiding and retrieval, in particular using fractals, of a digital information inside a multimedia document.Brevet FR 98 04 083 (in French).
Dugelay (J.-L.), Roche (S.). Method of marking a multimedia document, such as an image, by generating a mark.Brevets FR 98 07 607 et FR 99 02 154.
Roche (S.), Dugelay (J.-L.). Image watermarking based on the fractal transform.IEEE MutliMedia Signal Processing - MMSP, L. A., CA, pp. 358–362, (1998).
Jacquin (A. E.), Image coding based on a fractal theory of iterated contractive image transformations,IEEE Trans. on Image Proc.,2, n° l, pp. 18–30, (1992).
Polidori (E.), Dugelay (J.-L.). Zooming using i.f.s.,Fractals,5, Supplementary Issue, pp. 111–123, (1997).
Wu (J. K.) et al., A fractal-based clustering approach in large visual database systems,Multimedia Tools and Applications,3, pp. 225–244, (1996).
Vissac (M.), Dugelay (J.-L.), Rose (K.). A fractal-inspired approach to content-based image indexing.IEEE ICIP 99, Kobe, Japan, (October 25-28, 1999).
Hartung (F.), Girod Digital watermarking of raw and compressed video.Proc. European EOS/SPIE Symposium on Advanced Imaging and Network Technologies, (1996).
Hartung (F.), Girod Digital watermarking of mpeg-2 coded video in the bitstream domain.IEEE ICASSP (1997).
Hartung (F.), Girod Fast public-key watermarking of compressed video.IEEE ICIP, pp. 528–531, (1997).
Kalker (T.), Linnartz (J.-P.). Improved watermark detection reliability using filtering before correlation.Proc. IEEE Int. Conf. on Image Processing, (1998).
Kutter (M.). Watermarking resisting to translation, rotation and scaling.Proc. of SPIE,3528, pp. 423–431, Boston USA, (Nov. 1998).
Matsui (K.), Tanaka (K.), Video-steganography: how to secretly embed a signature in a picture.Journal of the interactive Multimedia Association Intellectual Property Project,1, pp. 187–206, (1994).
Jordan (F.), Vynne (T.). Motion vector watermarking.LTS EPFL, Patent, (1997).
Kutter (M.), Petitcolas (F.). A fair benchmark for image watermarking systems.Proceedings of SPIE 99,3657, (January 1999).
Macq Delannay (D.), Boucqueau (J.-M.). Infrastructures de sécurité pour la transmission des images.CORESA 99, Sophia Antipolis, (juin 99).
Barnet (R.). Laplacian removal attack (stirmark v2.2).http://www. cl. cam.ac. uk/~fapp2/watermarking/stirmark/
Craver (S.), Memon (N.), Yeo (B. L.), Yeung (M.). Can invisible watermarks resolve rightful ownerships?Proc. of SPIE,3022, pp. 310–321,(1997).
Gordon (J.). The story of Alice and Bob.http://www.conceptlabs.co.uk/alicebob.html. Zurich, (1984).
Boneh (D.), Shaw (J.). Collusion-secure fingerprinting for digital data.IEEE Trans, on Information Theory,44, n° 5, (1998).
Linnartz (J.-P.), Van Dijk (M.). Analysis of the sensitivity attack against electronic watermarks in images information hiding:Second International Workshop, Portland,1525 ofLecture Notes in Computer Science, pp. 258–272, (1998).
Jordan (F.), Kutter (M.), Ebrahimi (T.). Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video.ISO/IEC JTC1/SC29/WG11 MPEG97I, (July 1997).
Bloom (J. A.) et al. Copy protection for DVD video.Proceedings of the IEEE,87, n° 7, (July 1999).
Author information
Authors and Affiliations
Corresponding author
Additional information
Les activitéswatermarking de l’Institut Eurécom sont en partie soutenues par la dga, France Télécom et Thomson-CSF.
Rights and permissions
About this article
Cite this article
Dugelay, JL., Roche, S. Introduction au tatouage d’images. Ann. Télécommun. 54, 427–437 (1999). https://doi.org/10.1007/BF02996385
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/BF02996385
Mots clés
- Traitement image
- Article synthèse
- État actuel technique
- Codage image
- Cryptographie
- Protection information
- Sécurité