Skip to main content
Log in

Technologies du tatouage pour l’authentification et la protection des images

Watermarking technologies for authentication and protection of images

  • Published:
Annales Des Télécommunications Aims and scope Submit manuscript

Résumé

Cet article présente un survol des techniques de tatouage des images et de leur intégration dans des systèmes de protection. On montre ainsi que les problèmes de l’authentification des formes d’ondes et de leurs diverses représentations ainsi que ceux du traçage des copies numériques peuvent trouver des solutions grâce à cette technologie. Les techniques de traitement des images et le point de vue système de communication du tatouage sont brièvement évoqués. Quelques défis émergents sont donnés en guise de conclusion.

Abstract

This paper overviews image watermarking techniques and their integration into protection systems. It is shown how that technology can solve the problems of waveform authentication as well as those related to tracing of digital copies. Image processing techniques and the communication system of watermarking are briefly presented. Some challenges approach to the watermarking field are enumerated in the conclusion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Bibliographie

  1. Macq (B.) (Guest Editor), Special Issue on Identification & Protection of Multimedia Information,Proceedings of the IEEE, 87, n° 7, July 1999.

  2. Bhattacharjee (S.), Kutter (M.), Compression tolerant image authentication,in Proceedings of the IEEE ICIP, the IEEE ICIP 98, Volume 1 of 3, pp. 435–439, Chicago, October 98.

  3. ***, ebu/spmpte task force for harmonized standards for the exchange of programme material as bitstreams,EBU SPMPTE Technical Review, Special Supplement 1998

  4. Blum (L.), Blum (M.), Shub, (M.), A simple unpredictable pseudo-random number generator.SIAM Journal on Computing,15 (2), 1986.

  5. Knuth (D.E.), The art of computer programming.Addison Wesley, 2nd edition, 1981.

  6. Diffie (W.), Hellmann (M.E.). New directions in cryptography.IEEE Trans. IT,22 (6): 644–654, 1976.

    Article  MATH  Google Scholar 

  7. Swanson (M.D.), Zhu (B.), Tewfik (A.H.), Boney (L.),Robust audio watermarking using perceptual masking, Special Issue on Watermarking,Signal Processing,66, n° 3, pp. 337–356, Else- vier, May 98.

  8. Ohbuchi (R.), Masuda (H.), Aono (M.), Watermarking 3D polygonal models through geometric and topological modifications,IEEE Journal of Selected Areas in Communication,16 (4), pp. 551–560, May 1998.

    Article  Google Scholar 

  9. Braudaway (G.W.), Magerlein (K.A.), Mintzer (F.), Protecting publicly available images with a visible image watermarkingIn Proceedings of the SPIE/IS&T on Optical Security and Counterfeit Deterrence Techniques, Electronic Imaging,3016, pp. 126–133, February 97.

  10. Kundur (D.), Hatzinakos (D.), Towards a telltale watermarking technique for tamper-proofing,in Proceedings of the IEEE ICIP 98, Volume 2 of 3, pp. 409–413, Chicago, October 98.

  11. Bender (W.), Gruhl (D.), Morimoto (N.), Techniques for data hiding,in Proceedings of the SPIE, San Jose, California, pp. 2420–2440, February 95.

  12. Cox (), Kilian (J.), Leighton (F.), Shamoon (T.), Secure spread spectrum watermarking for multimedia,IEEE Transaction on Image Processing, 6, n° 12, pp. 1673–1687, 1997

  13. O’Ruanaidh (J.J.K.), Pun (T.), Rotation, scale and translation invariant spread spectrum digital image watermarking, Special Issue on Watermarking,Signal Processing,66, n° 3, pp. 303–318, May 1998.

    Article  MATH  Google Scholar 

  14. Meier (W.), Staffelbach (O.), The self shrinking generator. In R. E. Blahut et al, editor. Communications and cryptography: to sides of one tapestry, pp. 287–295.Kluwer Academic Publishers, 1994.

  15. Hartung (F.) andGirod (B.), Watermarking of uncompressed and compressed video, Special Issue on Watermarking,Signal Processing,66, n° 3, pp. 283–302, May 1998

    Article  MATH  Google Scholar 

  16. Podilchuk (C), Zeng (W.), Image-adaptive watermarkings using visual models,IEEE Journal of Selected Areas in Communication,16 (4), pp. 525–540, May 1998.

    Article  Google Scholar 

  17. Swanson (M.D.), Zhu (B.), Tewfik (A.H.), Multiresolution scene-based video watermarking using perceptual models,IEEE Journal of Slected Areas in Communication,16 (4), pp. 540–550, May 1998

    Article  Google Scholar 

  18. Delaigle (J.F.), De Vleeschouwer (C.), Macq (B.), Watermarking algorithm based on a human visual model, Special Issue on Watermarking,Signal Processing,66, n° 3, pp. 319–336, May 1998

    Article  MATH  Google Scholar 

  19. Peticolas (F.), Anderson (R.J.), Kuhn (M.G.), Attacks on copyright marking systems,in Information Hiding: second international workshop, Lecture notes in Computer Science.Springer Verlag, Berlin, Germany, 1998

    Google Scholar 

  20. Lacy (J.) et al, Intellectual property protection systems and digital watermarking,Information Hiding Workshop, Portland, Oregon, April 15–17 1998

  21. Kundur (D.), Hatzinakos (D.), Towards a telltale watermarking technique for tamper-proofing,1CIP 1998, 2, pp.

  22. Wu (M.), Bede (X.), Watermarking for image authentication,IEEEICIP 1998,2, pp. 437–441.

    Google Scholar 

  23. Fridrich (J.), Image watermarking for tamper detection,IEEE ICIP 1998,2, pp. 404–408.

    Google Scholar 

  24. Wolfgang (R.B.), Delp (E.J.), A watermarking for digital images,IEEE ICIP 96,3, pp. 219–222.

  25. Tanaka (K.), Nakamuara (Y.), Matsui (K.), Embedding secret information into a dithered multilevel image,in Proc. 1990,IEEE Military Com. Conf, Sept. 1990, pp. 216–220

  26. Van Schyndel (R.G.), Tirkel (A.Z.) andOsborne (CF.),A digital watermark,IEEE ICIP 1994, vol. 2, pp. 86–89

    Google Scholar 

  27. Pitas (I.) and Kaskalis (T.),Applying signatures on digital images, Proc. Of the IEEE Workshop on Non Linear Image and Signal Processing, June 1995, pp. 460–463

  28. Koch (E.) and Zhao (J.),Toward robust and hidden image copyright labeling, Proc. Of the IEEE Workshop on Non Linear Image and Signal Processing, June 1995, pp. 452–455

  29. Caronni (G.), Assuring ownership rights for digital images, Proc VIS95, Session « Reliable IT Systems », Vieweg, Germany 1995

    Google Scholar 

  30. Rey (C), Dugelay (J.-L.), Blind detection of malicious alterations on still images using robust watermarks,in Proc. iee Secure Images and Image Authentication, London, 10 April 2000.

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Benoît Macq or Jean-Luc Dugelay.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Macq, B., Dugelay, JL. Technologies du tatouage pour l’authentification et la protection des images. Ann. Télécommun. 55, 92–100 (2000). https://doi.org/10.1007/BF03001902

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03001902

Mots clés

Key words

Navigation