scispace - formally typeset
Search or ask a question

Showing papers on "Digital watermarking published in 1998"


Journal ArticleDOI
01 Jun 1998
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Abstract: We review developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible or invisible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal, e.g., multilingual soundtracks in a movie, or provide copyright protection. We discuss the reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream. We also discuss the issues and problems associated with copy and copyright protection and assess the viability of current watermarking algorithms as a means for protecting copyrighted data.

1,023 citations


Journal ArticleDOI
C.I. Podilchuk1, Wenjun Zeng2
TL;DR: This work proposes perceptually based watermarking schemes in two frameworks: the block-based discrete cosine transform and multiresolution wavelet framework and discusses the merits of each one, which are shown to provide very good results both in terms of image transparency and robustness.
Abstract: The huge success of the Internet allows for the transmission, wide distribution, and access of electronic data in an effortless manner. Content providers are faced with the challenge of how to protect their electronic data. This problem has generated a flurry of research activity in the area of digital watermarking of electronic content for copyright protection. The challenge here is to introduce a digital watermark that does not alter the perceived quality of the electronic content, while being extremely robust to attack. For instance, in the case of image data, editing the picture or illegal tampering should not destroy or transform the watermark into another valid signature. Equally important, the watermark should not alter the perceived visual quality of the image. From a signal processing perspective, the two basic requirements for an effective watermarking scheme, robustness and transparency, conflict with each other. We propose two watermarking techniques for digital images that are based on utilizing visual models which have been developed in the context of image compression. Specifically, we propose watermarking schemes where visual models are used to determine image dependent upper bounds on watermark insertion. This allows us to provide the maximum strength transparent watermark which, in turn, is extremely robust to common image processing and editing such as JPEG compression, rescaling, and cropping. We propose perceptually based watermarking schemes in two frameworks: the block-based discrete cosine transform and multiresolution wavelet framework and discuss the merits of each one. Our schemes are shown to provide very good results both in terms of image transparency and robustness.

962 citations


Journal ArticleDOI
TL;DR: The proposed method is robust and of much lower complexity than a complete decoding process followed by watermarking in the pixel domain and re-encoding, and is also applicable to other hybrid transform coding schemes like MPEG-1, MPEG-4, H.263.

861 citations


Journal ArticleDOI
TL;DR: In this paper, a Fourier-Mellin-based approach is used to construct watermarks which are designed to be unaffected by any combination of rotation and scale transformations, and a novel method of CDMA spread spectrum encoding is introduced which allows one to embed watermark messages of arbitrary length and which need only a secret key for decoding.

820 citations


Journal ArticleDOI
TL;DR: A new watermarking algorithm is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of real numbers in a selected set of DCT coefficients, which is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility.

743 citations


Proceedings Article
01 Sep 1998
TL;DR: In this article, the authors proposed an audio watermarking method that uses a seed known only by the copyright owner to create the watermark signal to be embedded in the audio signal.
Abstract: The audio watermarking method presented below offers copyright protection to an audio signal by modifying its temporal characteristics. The amount of modification embedded is limited by the necessity that the output signal must not be perceptually different from the original one. The watermarking method presented here does not require the original signal for watermark detection. The watermark key is simply a seed known only by the copyright owner. This seed creates the watermark signal to be embedded. Watermark embedding depends also on the audio signal amplitude in a way that minimizes the audibility of the watermark signal. The embedded watermark is robust to MPEG audio coding, filtering, resampling and requantization.

555 citations


Journal ArticleDOI
TL;DR: A copyright protection method that is based on hiding an ‘invisible’ signal, known as digital watermark, in the image is presented and a variation that generates image dependent watermarks as well as a method to handle geometrical distortions are presented.

542 citations


Journal ArticleDOI
TL;DR: This work presents a watermarking procedure to embed copyright protection into digital audio by directly modifying the audio samples and introduces the notion of a dual watermark: one which uses the original signal during detection and one which does not.

506 citations


Journal ArticleDOI
TL;DR: It is shown that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone, and existing techniques are attacked by providing counterfeit water marking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership.
Abstract: Digital watermarks have been proposed as a means for copyright protection of multimedia data. We address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection.

481 citations


Proceedings ArticleDOI
12 May 1998
TL;DR: In this article, a multiresolution wavelet fusion technique is proposed for the digital watermarking of still images, which is robust to a variety of signal distortions and is not required for watermark extraction.
Abstract: We present a novel technique for the digital watermarking of still images based on the concept of multiresolution wavelet fusion. The algorithm is robust to a variety of signal distortions. The original unmarked image is not required for watermark extraction. We provide analysis to describe the behaviour of the method for varying system parameter values. We compare our approach with another transform domain watermarking method. Simulation results show the superior performance of the technique and demonstrate its potential for the robust watermarking of photographic imagery.

466 citations


Proceedings ArticleDOI
Ping Wah Wong1
04 Oct 1998
TL;DR: A public key watermarking algorithm for image integrity verification that uses a public key as in public key cryptography, and hence it can be performed by any person without the secure exchange of a secret key.
Abstract: We propose a public key watermarking algorithm for image integrity verification. This watermark is capable of detecting any change made to an image, including changes in pixel values and image size. This watermark is important for several imaging applications, including trusted camera, legal usage of images, medical archiving of images, news reporting, commercial image transaction, and others. In each of these applications, it is important to verify that the image has not been manipulated and that the image was originated by either a specific camera or a specific user. The verification (the watermark extraction) procedure uses a public key as in public key cryptography, and hence it can be performed by any person without the secure exchange of a secret key. This is very important in many applications (e.g., trusted camera, news reporting) where the exchange of a secret key is either not possible or undesirable.

Journal ArticleDOI
TL;DR: The robustness of the watermarking procedure to embed copyright protection into digital video to several video degradations and distortions is demonstrated.
Abstract: We present a watermarking procedure to embed copyright protection into digital video. Our watermarking procedure is scene-based and video dependent. It directly exploits spatial masking, frequency masking, and temporal properties to embed an invisible and robust watermark. The watermark consists of static and dynamic temporal components that are generated from a temporal wavelet transform of the video scenes. The resulting wavelet coefficient frames are modified by a perceptually shaped pseudorandom sequence representing the author. The noise-like watermark is statistically undetectable to thwart unauthorized removal. Furthermore, the author representation resolves the deadlock problem. The multiresolution watermark may be detected on single frames without knowledge of the location of the frames in the video scene. We demonstrate the robustness of the watermarking procedure to several video degradations and distortions.

Book ChapterDOI
14 Apr 1998
TL;DR: Characteristics in current steganography software that direct the steganalyst to the existence of a hidden message are identified and the ground work of a tool for automatically detecting theexistence of hidden messages in images is introduced.
Abstract: Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Steganalysis is the art of discovering and rendering useless such covert messages. In this paper, we identify characteristics in current steganography software that direct the steganalyst to the existence of a hidden message and introduce the ground work of a tool for automatically detecting the existence of hidden messages in images.

Journal ArticleDOI
TL;DR: In this paper, the authors discuss to what extent a watermark can be resistant to tampering and describe a variety of possible attacks on the watermark and its resilience to normal signal transformations.
Abstract: Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for copyright control, where it is envisaged that digital video recorders will not permit the recording of content that is watermarked as "never copy". In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to remove the watermark so that an illegal copy can be made. We discuss to what extent a watermark can be resistant to tampering and describe a variety of possible attacks.

Proceedings ArticleDOI
04 Oct 1998
TL;DR: A new method for digital image watermarking which does not require the original image for watermark detection is presented and features improved resistance to attacks on the watermark, implicit visual masking utilizing the time-frequency localization property of the wavelet transform and a robust definition for the threshold which validates the watermarks.
Abstract: A new method for digital image watermarking which does not require the original image for watermark detection is presented. Assuming that we are using a transform domain spread spectrum watermarking scheme, it is important to add the watermark in select coefficients with significant image energy in the transform domain in order to ensure non-erasability of the watermark. Previous methods, which did not use the original in the detection process, could not selectively add the watermark to the significant coefficients, since the locations of such selected coefficients can change due to image manipulations. Since watermark verification typically consists of a process of correlation which is extremely sensitive to the relative order in which the watermark coefficients are placed within the image, such changes in the location of the watermarked coefficients was unacceptable. We present a scheme which overcomes this problem of "order sensitivity". Advantages of the proposed method include (i) improved resistance to attacks on the watermark, (ii) implicit visual masking utilizing the time-frequency localization property of the wavelet transform and (iii) a robust definition for the threshold which validates the watermark. We present results comparing our method with previous techniques, which clearly validate our claims.

Proceedings ArticleDOI
Min Wu1, Bede Liu1
04 Oct 1998
TL;DR: A data embedding method is proposed for image authentication based on table look-up in frequency domain that can detect and localize alterations of the original image, such as the tampering of images exported from a digital camera.
Abstract: A data embedding method is proposed for image authentication based on table look-up in frequency domain. A visually meaningful watermark and a set of simple features are embedded invisibly in the marked image, which can be stored in the compressed form. The scheme can detect and localize alterations of the original image, such as the tampering of images exported from a digital camera.

Patent
28 Aug 1998
TL;DR: In this paper, the work to be protected is digitized and a baseline watermark vector is derived, and a watermark offset vector is created and then stored in the computer.
Abstract: The work to be protected is digitized (10) and a baseline watermark is derived (12). A watermark offset vector is created (16) and then stored (18). The offset vector is added to the baseline watermark vector to generate a modified watermark vector (20). The baseline watermark vector is replaced with the modified watermark in the digitized work (22). And, finally, the watermarked work is returned to the original form (24).

Patent
30 Mar 1998
TL;DR: In this article, a method for combining digital data with a perceptible program signal is proposed, where the data stream is modulated onto an electromagnetic signal encoding the perceptible signal; the modulating employs a spread spectrum encoding of the data streams.
Abstract: A method for combining digital data with a perceptible program signal. The data stream is modulated onto an electromagnetic signal encoding the perceptible signal; the modulating employs a spread spectrum encoding of the data stream. The modulated program signal is transduced into perceptible form. A capture device receives the perceptible signal, and a decoder extracts the spread spectrum encoded data from the received signal. The method is particularly useful in encoding purchase information or watermarking information into the signal.

Journal ArticleDOI
TL;DR: This poster presents a poster presenting a probabilistic procedure for estimating the response of the immune system to laser-spot assisted treatment of central nervous system injuries.
Abstract: Keywords: LTS1 Reference LTS-ARTICLE-1998-011doi:10.1117/1.482648View record in Web of Science Record created on 2006-06-14, modified on 2016-08-08

Proceedings ArticleDOI
01 May 1998
TL;DR: Watermarking-based IP protection is a technique for identification that is nearly invisible to human and machine inspection, difficult to remove, and permanently embedded as an integral part of the design as discussed by the authors.
Abstract: Digital system designs are the product of valuable effort and know-how Their embodiments, from software and HDL program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP) Hence, design methodologies based on IP reuse require new mechanisms to protect the rights of IP producers and owners This paper establishes principles of watermarking-based IP protection, where a watermark is a mechanism for identification that is (i) nearly invisible to human and machine inspection, (ii) difficult to remove, and (iii) permanently embedded as an integral part of the design We survey related work in cryptography and design methodology, then develop desiderata, metrics and example approaches — centering on constraint-based techniques — for watermarking at various stages of the VLSI design process

Patent
30 Mar 1998
TL;DR: A watermarking scheme for images which includes techniques for inserting and extracting fragile watermarks in the frequency domain and for determining whether an image so watermarked has been tampered with is presented in this paper.
Abstract: A watermarking scheme for images which includes techniques for inserting and extracting fragile watermarks in the frequency domain and for determining whether an image so watermarked has been tampered with. Watermark insertion is accomplished by embedding the bits of a digital signature of a hash function of the image in the frequency coefficients of the image. Tamper detection is accomplished generally as follows: the fragile watermark which was embedded during the watermark insertion process is extracted from the image; the hash function of the image is computed as in the insertion process; it is verified using a public key whether the extracted watermark is a valid signature of the hash value. If so, then there is assurance that the image has not been tampered with. Otherwise, there is reason to conclude that the image has been tampered with.

Journal ArticleDOI
TL;DR: The experimental results show that the proposed watermarking technique results in an almost invisible difference between the watermarked image and the original image, and is robust to common image processing operations and JPEG lossy compression.
Abstract: In this paper, a multiresolution-based technique for embedding digital "watermarks" into images is proposed. The watermarking technique has been proposed as a method by hiding secret information in the images so as to discourage unauthorized copying or attesting the origin of the images. In our method, we take advantage of multiresolution signal decomposition. Both the watermark and the host image are composed of multiresolution representations with different structures and then the decomposed watermarks of different resolution are embedded into the corresponding resolution of the decomposed images. In case of image quality degradation, the low-resolution rendition of the watermark will still be preserved within the corresponding low-resolution components of the image. The experimental results show that the proposed watermarking technique results in an almost invisible difference between the watermarked image and the original image, and is robust to common image processing operations and JPEG lossy compression.

Proceedings ArticleDOI
04 Oct 1998
TL;DR: An oblivious watermarking technique for tamper detection in digital images that enables us to distinguish malicious changes, such as replacing/adding features from nonmalicious changes resulting from common image processing operations.
Abstract: We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing/adding features from nonmalicious changes resulting from common image processing operations. The technique can be implemented with small memory and computational requirements, which makes it potentially useful for hardware implementation in digital cameras. The technique works by dividing an image into blocks and watermarking each block with a transparent, robust watermark that sensitively depends on a secret key (camera's ID) and continuously on the image. The watermarking method is a frequency based spread spectrum technique. To achieve a continuous dependency on the image, we propose a special bit extraction procedure that extracts bits from each block by thresholding projections onto key-dependent random smooth patterns. Those bits are then used for initializing a PRNG and synthesizing the spread spectrum signal.

Journal ArticleDOI
TL;DR: It is shown that this multiresolution watermarking method is more robust to proposed methods to some common image distortions, such as the wavelet transform based image compression, image rescaling/stretching and image halftoning.
Abstract: In this paper, we introduce a new multiresolution watermarking method for digital images. The method is based on the discrete wavelet transform (DWT). Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image. It is shown that this method is more robust to proposed methods to some common image distortions, such as the wavelet transform based image compression, image rescaling/stretching and image halftoning. Moreover, the method is hierarchical.

Proceedings ArticleDOI
07 Dec 1998
TL;DR: A new class of embedding methods called quantization index modulation (QIM) is proposed and an example of such a method called dither modulation is developed in which the embedded information modulates the dither signal of a dithered quantizer.
Abstract: A variety of related applications have emerged that require the design of systems for embedding one signal within another signal. We propose a new class of embedding methods called quantization index modulation (QIM) and develop an example of such a method called dither modulation in which the embedded information modulates the dither signal of a dithered quantizer. We also develop a framework within which one can analyze performance trade-offs among robustness, distortion, and embedding rate, and we show that QIM systems have considerable performance advantages over previously proposed spread-spectrum and low-bit modulation systems.

Journal ArticleDOI
TL;DR: This paper develops watermarking methods which successfully resolve the ownership of watermarked MPEG video and/or uncompressed video/image and designs customer rights protocols which give legal customers the ability to create their own evidence and prove their legitimate rights to use the watermarked multimedia data.

Journal ArticleDOI
TL;DR: This paper presents an additive watermarking technique for grey-scale pictures that consists in secretly embedding copyright information (a binary code) into the picture without degrading its quality through the phase of maximal length sequences (MLS).

Patent
28 Aug 1998
TL;DR: In this paper, the original image is cut into blocks to which the Discrete Cosine Transform (DCT) coefficients are quantized and the coefficients are authenticated, and the DCT output of each block is dequantized.
Abstract: A watermarking method involves mostly invisible artifacts and is sensitive to any modification of the picture at the level of precision rendered by the compressed version of the image. The image is compressed according to a known compression standard, such as the JPEG standard, and with a fixed quality setting. Using the JPEG standard, the original image is cut into blocks to which the Discrete Cosine Transform (DCT) is applied and the DCT coefficients quantized. The watermark according to the invention is applied to the quantized DCT coefficients. This is done using an encryption function, such as a secret key/public key algorithm. The JPEG compression is then completed using a lossless compression scheme, such as Huffman coding, to produce the compressed and watermarked image. Authentication of the compressed and watermarked image begins with a lossless decompression scheme to obtain the set of quantized DCT coefficients. The coefficients are authenticated, and the DCT output of each block is dequantized. If necessary, an inverse DCT is applied to each block to output the decompressed watermarked image.

Journal ArticleDOI
TL;DR: The experimental results show that the proposed watermarking technique results in an almost invisible difference between the watermarked frames and the original frames, and is also robust to cropping operations and MPEG compression.
Abstract: An MPEG-based technique for embedding digital "watermarks" into digital video is proposed. The watermarking technique has been proposed as a method to hide secret information in the signals so as to discourage unauthorized copying or attest the origin of the media. In the proposed method, we take advantage of prediction types of MPEG bitstreams to embed watermarks into both intraframe and non-intraframe with different residual masks. The experimental results show that the proposed watermarking technique results in an almost invisible difference between the watermarked frames and the original frames, and is also robust to cropping operations and MPEG compression.

Patent
Ping Wah Wong1
30 Apr 1998
TL;DR: The watermark insertion procedure computes a hash function and then combines the output of the hashed function of a modified image block, a key and various image parameters with a block of the watermark bitmap, resulting in a combined image block as discussed by the authors.
Abstract: The present invention provides an invisible digital watermarking technique that can serve the two purposes of ownership verification and authentication, that can detect changes in pixel values as well as image size, and that may be used in public key or alternatively, secret key watermarking systems. The watermark insertion procedure computes a hash function and then combines the output of the hashed function of a modified image block, a key and various image parameters with a block of the watermark bitmap, resulting in a combined image block. As a final step to create a watermarked image block, the combined image block is inserted into the LSB of the modified image. The watermark extraction procedure takes the watermarked image block and creates two different image blocks: a first image block with the LSB's of the watermarked image block set to zero, and a second image block with the LSB's of the watermarked image block extracted. The watermark extraction procedure uses the hash function to calculate a digest of values, resulting in a hashed output. The hashed output is combined with the second image block, preferably using an exclusive OR function. The result of the combined hashed output with the second image block is a block of the extracted watermark.