Résumé
Cet article présente un survol des techniques de tatouage des images et de leur intégration dans des systèmes de protection. On montre ainsi que les problèmes de l’authentification des formes d’ondes et de leurs diverses représentations ainsi que ceux du traçage des copies numériques peuvent trouver des solutions grâce à cette technologie. Les techniques de traitement des images et le point de vue système de communication du tatouage sont brièvement évoqués. Quelques défis émergents sont donnés en guise de conclusion.
Abstract
This paper overviews image watermarking techniques and their integration into protection systems. It is shown how that technology can solve the problems of waveform authentication as well as those related to tracing of digital copies. Image processing techniques and the communication system of watermarking are briefly presented. Some challenges approach to the watermarking field are enumerated in the conclusion.
Bibliographie
Macq (B.) (Guest Editor), Special Issue on Identification & Protection of Multimedia Information,Proceedings of the IEEE, 87, n° 7, July 1999.
Bhattacharjee (S.), Kutter (M.), Compression tolerant image authentication,in Proceedings of the IEEE ICIP, the IEEE ICIP 98, Volume 1 of 3, pp. 435–439, Chicago, October 98.
***, ebu/spmpte task force for harmonized standards for the exchange of programme material as bitstreams,EBU SPMPTE Technical Review, Special Supplement 1998
Blum (L.), Blum (M.), Shub, (M.), A simple unpredictable pseudo-random number generator.SIAM Journal on Computing,15 (2), 1986.
Knuth (D.E.), The art of computer programming.Addison Wesley, 2nd edition, 1981.
Diffie (W.), Hellmann (M.E.). New directions in cryptography.IEEE Trans. IT,22 (6): 644–654, 1976.
Swanson (M.D.), Zhu (B.), Tewfik (A.H.), Boney (L.),Robust audio watermarking using perceptual masking, Special Issue on Watermarking,Signal Processing,66, n° 3, pp. 337–356, Else- vier, May 98.
Ohbuchi (R.), Masuda (H.), Aono (M.), Watermarking 3D polygonal models through geometric and topological modifications,IEEE Journal of Selected Areas in Communication,16 (4), pp. 551–560, May 1998.
Braudaway (G.W.), Magerlein (K.A.), Mintzer (F.), Protecting publicly available images with a visible image watermarkingIn Proceedings of the SPIE/IS&T on Optical Security and Counterfeit Deterrence Techniques, Electronic Imaging,3016, pp. 126–133, February 97.
Kundur (D.), Hatzinakos (D.), Towards a telltale watermarking technique for tamper-proofing,in Proceedings of the IEEE ICIP 98, Volume 2 of 3, pp. 409–413, Chicago, October 98.
Bender (W.), Gruhl (D.), Morimoto (N.), Techniques for data hiding,in Proceedings of the SPIE, San Jose, California, pp. 2420–2440, February 95.
Cox (), Kilian (J.), Leighton (F.), Shamoon (T.), Secure spread spectrum watermarking for multimedia,IEEE Transaction on Image Processing, 6, n° 12, pp. 1673–1687, 1997
O’Ruanaidh (J.J.K.), Pun (T.), Rotation, scale and translation invariant spread spectrum digital image watermarking, Special Issue on Watermarking,Signal Processing,66, n° 3, pp. 303–318, May 1998.
Meier (W.), Staffelbach (O.), The self shrinking generator. In R. E. Blahut et al, editor. Communications and cryptography: to sides of one tapestry, pp. 287–295.Kluwer Academic Publishers, 1994.
Hartung (F.) andGirod (B.), Watermarking of uncompressed and compressed video, Special Issue on Watermarking,Signal Processing,66, n° 3, pp. 283–302, May 1998
Podilchuk (C), Zeng (W.), Image-adaptive watermarkings using visual models,IEEE Journal of Selected Areas in Communication,16 (4), pp. 525–540, May 1998.
Swanson (M.D.), Zhu (B.), Tewfik (A.H.), Multiresolution scene-based video watermarking using perceptual models,IEEE Journal of Slected Areas in Communication,16 (4), pp. 540–550, May 1998
Delaigle (J.F.), De Vleeschouwer (C.), Macq (B.), Watermarking algorithm based on a human visual model, Special Issue on Watermarking,Signal Processing,66, n° 3, pp. 319–336, May 1998
Peticolas (F.), Anderson (R.J.), Kuhn (M.G.), Attacks on copyright marking systems,in Information Hiding: second international workshop, Lecture notes in Computer Science.Springer Verlag, Berlin, Germany, 1998
Lacy (J.) et al, Intellectual property protection systems and digital watermarking,Information Hiding Workshop, Portland, Oregon, April 15–17 1998
Kundur (D.), Hatzinakos (D.), Towards a telltale watermarking technique for tamper-proofing,1CIP 1998, 2, pp.
Wu (M.), Bede (X.), Watermarking for image authentication,IEEEICIP 1998,2, pp. 437–441.
Fridrich (J.), Image watermarking for tamper detection,IEEE ICIP 1998,2, pp. 404–408.
Wolfgang (R.B.), Delp (E.J.), A watermarking for digital images,IEEE ICIP 96,3, pp. 219–222.
Tanaka (K.), Nakamuara (Y.), Matsui (K.), Embedding secret information into a dithered multilevel image,in Proc. 1990,IEEE Military Com. Conf, Sept. 1990, pp. 216–220
Van Schyndel (R.G.), Tirkel (A.Z.) andOsborne (CF.),A digital watermark,IEEE ICIP 1994, vol. 2, pp. 86–89
Pitas (I.) and Kaskalis (T.),Applying signatures on digital images, Proc. Of the IEEE Workshop on Non Linear Image and Signal Processing, June 1995, pp. 460–463
Koch (E.) and Zhao (J.),Toward robust and hidden image copyright labeling, Proc. Of the IEEE Workshop on Non Linear Image and Signal Processing, June 1995, pp. 452–455
Caronni (G.), Assuring ownership rights for digital images, Proc VIS95, Session « Reliable IT Systems », Vieweg, Germany 1995
Rey (C), Dugelay (J.-L.), Blind detection of malicious alterations on still images using robust watermarks,in Proc. iee Secure Images and Image Authentication, London, 10 April 2000.
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Macq, B., Dugelay, JL. Technologies du tatouage pour l’authentification et la protection des images. Ann. Télécommun. 55, 92–100 (2000). https://doi.org/10.1007/BF03001902
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF03001902
Mots clés
- Traitement image
- Article synthèse
- Codage image
- Cryptographie
- Protection information
- Sécurité
- Propriété intellectuelle
- Distorsion signal
- Authentification
- Tatouage