scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Implementation of a visible watermarking in a secure still digital camera using VLSI design

TL;DR: This paper presents new very large scale integration (VLSI) architecture for implementing two visible digital image-watermarking schemes designed to aim at easy integration into any existing digital camera framework.
Abstract: Watermarking is the process that embeds data called a watermark, a tag, or a label into a multimedia object, such as images, video, or text, for their copyright protection. According to human perception, the digital watermarks can either be visible or invisible. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modifications made to the pixel value are perceptually not noticed, and it can be recovered only with an appropriate decoding mechanism. This paper presents new very large scale integration (VLSI) architecture for implementing two visible digital image-watermarking schemes. The proposed architecture is designed to aim at easy integration into any existing digital camera framework.
Citations
References
More filters
Journal ArticleDOI
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Abstract: This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

6,194 citations


"Implementation of a visible waterma..." refers background in this paper

  • ...According to human perception, the digital watermarks can be divided into four categories: (1) Visible, (2) Invisible-robust, (3) Invisible-fragile, ( 4 ) Dual Whether each owner has a unique watermark or an owner wants to use different watermarks in different objects, the marking algorithm incorporates the watermark into the object....

    [...]

Book
31 Dec 1999
TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Abstract: From the Publisher: Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, a description of possible applications, and a survey of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis," methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities and differences to steganography. You gain a working knowledge of watermarking's pros and cons, and you learn the legal implications of watermarking and copyright issues on the Internet.

1,732 citations

Journal ArticleDOI
TL;DR: The digital signature standard (DSS) as mentioned in this paper was proposed to authenticate electronic mail messages by using modern cryptographic techniques to prevent the explosion of very capable personal computers from driving up the incidence of doctored photographs being passed off as truth.
Abstract: The trustworthy digital camera is an application of existing technology toward the solution of an evermore-troubling social problem, the eroding credibility of the photographic image. Although it will always be possible to lie with a photograph (using such time-honored techniques as false perspective and misleading captions), this proposed device will prevent the explosion of very capable personal computers from driving up the incidence of doctored photographs being passed off as truth. A solution to this problem comes from the proposed digital signature standard (DSS), which incorporates modern cryptographic techniques to authenticate electronic mail messages. >

502 citations

Journal ArticleDOI
TL;DR: Book cover plate showing the crest of the Scheurl family (16th century).
Abstract: Book cover plate showing the crest of the Scheurl family (16th century).

295 citations


"Implementation of a visible waterma..." refers background or methods in this paper

  • ...(3) We performed extensive software simulations for various test images and found that the pixel values of the watermarked images obtained using the above set of equations match with that obtained using original equation with the help of MATLAB....

    [...]

  • ...According to human perception, the digital watermarks can be divided into four categories: (1) Visible, (2) Invisible-robust, (3) Invisible-fragile, (4) Dual...

    [...]

  • ...According to human perception, the digital watermarks can be divided into four categories: (1) Visible, (2) Invisible-robust, (3) Invisible-fragile, (4) Dual A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a casual viewer on careful inspection....

    [...]

Proceedings ArticleDOI
15 Mar 1996
TL;DR: The technical goals for watermarking include applying a readily visible mark to the image that clearly identifies its ownership, permitting all image detail to be visible through the watermark, and making the watermarks difficult to remove.
Abstract: In some cases, it is desired to produce images that are suitable for one application and unsuitable for others. With the 'Vatican Library Accessible Worldwide' and 'Luther Digital' projects, for example, it was desired to make available through the Internet images of Vatican Library and Luther Library manuscripts that are suitable for scholarly study yet are unsuitable as a source for unapproved publication. One of the techniques used to accomplish this is the visible image watermark. Our technical goals for watermarking include (1) applying a readily visible mark to the image that clearly identifies its ownership, (2) permitting all image detail to be visible through the watermark, and (3) making the watermark difficult to remove. In this paper, we describe the technique we use. We also discuss the characteristics of good watermarks and options we have used in their application. illustrative watermarked images are presented.© (1996) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.

168 citations