scispace - formally typeset
Search or ask a question

Showing papers on "Digital watermarking published in 2003"


Book ChapterDOI
25 May 2003
TL;DR: A theoretical proof and numerous experiments show that the PSNR of the marked image generated by this method is always above 48 dB, which is much higher than other reversible data hiding algorithms.
Abstract: This paper presents a novel reversible data hiding algorithm, which can recover the original image without distortion from the marked image after the hidden data have been extracted. This algorithm utilizes the zero or the minimum point of the histogram and slightly modifies the pixel values to embed data. It can embed more data as compared to most of the existing reversible data hiding algorithms. A theoretical proof and numerous experiments show that the PSNR of the marked image generated by this method is always above 48 dB, which is much higher than other reversible data hiding algorithms. The algorithm has been applied to a wide range of different images successfully. Some experimental results are presented to demonstrate the validity of the algorithm.

672 citations


Journal ArticleDOI
TL;DR: The proposed ISS is as robust in practice as traditional SS, and achieves roughly the same noise robustness gain as quantization index modulation (QIM) but without the amplitude scale sensitivity of QIM.
Abstract: This paper introduces a new watermarking modulation technique, which we call improved spread spectrum (ISS). When compared with traditional spread spectrum (SS), the signal does not act as a noise source, leading to significant gains. In some examples, performance improvements over SS are 20 dB in signal-to-noise ratio (SNR) or ten or more orders of magnitude in the error probability. The proposed method achieves roughly the same noise robustness gain as quantization index modulation (QIM) but without the amplitude scale sensitivity of QIM. Our proposed ISS is as robust in practice as traditional SS.

499 citations


Journal ArticleDOI
TL;DR: This paper presents several novel mechanisms for effective encoding and detection of direct-sequence spread-spectrum watermarks in audio signals and explores the security implications and watermark robustness on a benchmark suite that includes a combination of audio processing primitives.
Abstract: Watermarking has become a technology of choice for a broad range of multimedia copyright protection applications. Watermarks have also been used to embed format-independent metadata in audio/video signals in a way that is robust to common editing. In this paper, we present several novel mechanisms for effective encoding and detection of direct-sequence spread-spectrum watermarks in audio signals. The developed techniques aim at (i) improving detection convergence and robustness, (ii) improving watermark imperceptiveness, (iii) preventing desynchronization attacks, (iv) alleviating estimation/removal attacks, and finally, (v) establishing covert communication over a public audio channel. We explore the security implications of the developed mechanisms and review watermark robustness on a benchmark suite that includes a combination of audio processing primitives including: time- and frequency-scaling with wow-and-flutter, additive and multiplicative noise, resampling, requantization, noise reduction, and filtering.

444 citations


Journal ArticleDOI
TL;DR: Circular interpretation of bijective transformations is proposed to implement a method that fulfills all quality and functionality requirements of lossless watermarking.
Abstract: The need for reversible or lossless watermarking methods has been highlighted in the literature to associate subliminal management information with losslessly processed media and to enable their authentication. The paper first analyzes the specificity and the application scope of lossless watermarking methods. It explains why early attempts to achieve reversibility are not satisfactory. They are restricted to well-chosen images, strictly lossless context and/or suffer from annoying visual artifacts. Circular interpretation of bijective transformations is proposed to implement a method that fulfills all quality and functionality requirements of lossless watermarking. Results of several bench tests demonstrate the validity of the approach.

438 citations


Journal ArticleDOI
TL;DR: The purpose of this paper is to give an in-depth overview of video watermarking and to point out that it is not only a simple extension of still imagesWatermarking, which has to be considered, specific challenges have to be taken up and video-driven approaches have to been investigated.
Abstract: Digital watermarking was introduced at the end of the 20th century to provide means of enforcing copyright protection once the use and distribution of digital multimedia data have exploded. This technology has first been intensively investigated for still images and recent efforts have been put to exhibit unifying characteristics. On the other hand, the situation is rather different in the context of video watermarking, where unrelated articles are scattered throughout the literature. The purpose of this paper is consequently to give an in-depth overview of video watermarking and to point out that it is not only a simple extension of still images watermarking. New applications have to be considered, specific challenges have to be taken up and video-driven approaches have to be investigated.

421 citations


Journal ArticleDOI
TL;DR: A complete performance analysis of the scalar Costa scheme (SCS), which is a suboptimal technique using scalar embedding and reception functions, and results with state-of-the-art coding techniques are compared.
Abstract: Research on information embedding, particularly information hiding techniques, has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust against malicious or accidental attacks, might offer new possibilities to enforce the copyrights of multimedia data. In this paper, the specific case of information embedding into independent identically distributed (IID) data and attacks by additive white Gaussian noise (AWGN) is considered. The original data is not available to the decoder. For Gaussian data, in 1983, Costa proposed a scheme that theoretically achieves the capacity of this communication scenario. However, Costa's scheme is not practical. Thus, several research groups have proposed suboptimal practical communication schemes based on Costa's idea. The goal of this paper is to give a complete performance analysis of the scalar Costa scheme (SCS), which is a suboptimal technique using scalar embedding and reception functions. Information theoretic bounds and simulation results with state-of-the-art coding techniques are compared. Further, reception after amplitude scaling attacks and the invertibility of SCS embedding are investigated.

410 citations


Journal ArticleDOI
TL;DR: A new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construct a structural digital signature (SDS) for image authentication, which can tolerate content-preserving modifications while detecting content-changing modifications.
Abstract: The existing digital data verification methods are able to detect regions that have been tampered with, but are too fragile to resist incidental manipulations. This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construct a structural digital signature (SDS) for image authentication. The characteristic of the SDS is that it can tolerate content-preserving modifications while detecting content-changing modifications. Many incidental manipulations, which were detected as malicious modifications in the previous digital signature verification or fragile watermarking schemes, can be bypassed in the proposed scheme. Performance analysis is conducted and experimental results show that the new scheme is indeed superb for image authentication.

387 citations


Journal ArticleDOI
TL;DR: This work introduces two applications of an amplitude modulation-based watermarking method, in which a user's biometric data is hidden in a variety of images and has the ability to increase the security of both the hiddenBiometric data and host images.
Abstract: With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of security/integrity of biometric data extremely critical. We introduce two applications of an amplitude modulation-based watermarking method, in which we hide a user's biometric data in a variety of images. This method has the ability to increase the security of both the hidden biometric data (e.g., eigen-face coefficients) and host images (e.g., fingerprints). Image adaptive data embedding methods used in our scheme lead to low visibility of the embedded signal. Feature analysis of host images guarantees high verification accuracy on watermarked (e.g., fingerprint) images.

371 citations


Journal ArticleDOI
TL;DR: A blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite image watermarking algorithm that is robust against both affine transformation and JPEG compression is proposed.
Abstract: Robustness is a crucially important issue in watermarking. Robustness against geometric distortion and JPEG compression at the same time with blind extraction remains especially challenging. A blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite image watermarking algorithm that is robust against both affine transformation and JPEG compression is proposed. The algorithm improves robustness by using a new embedding strategy, watermark structure, 2D interleaving, and synchronization technique. A spread-spectrum-based informative watermark with a training sequence is embedded in the coefficients of the LL subband in the DWT domain while a template is embedded in the middle frequency components in the DFT domain. In watermark extraction, we first detect the template in a possibly corrupted watermarked image to obtain the parameters of an affine transform and convert the image back to its original shape. Then, we perform translation registration using the training sequence embedded in the DWT domain, and, finally, extract the informative watermark. Experimental work demonstrates that the proposed algorithm generates a more robust watermark than other reported watermarking algorithms. Specifically it is robust simultaneously against almost all affine transform related testing functions in StirMark 3.1 and JPEG compression with quality factor as low as 10. While the approach is presented for gray-level images, it can also be applied to color images and video sequences.

356 citations


Patent
14 Oct 2003
TL;DR: In this paper, the authors provide methods and systems for authenticating identification documents (100) including two or more digital watermarks (27, 60), which correspond with each other or with indicia carried by the identification document (100).
Abstract: The present invention provides methods and systems for authenticating identification documents (100). We also teach an identification document (100) including two or more digital watermarks (27, 60). The watermarks correspond with each other or with indicia carried by the identification document (100). The correspondence can be verified to determine authenticity. We also provide digital watermark detection methods and systems to identify the different watermarks (100) through embedded orientation components. We then focus watermark message-decoding efforts on areas identified as likely including watermark orientation components (27, 60). In one implementation we provide a watermark detection trigger to identify so-called legacy documents. The trigger may indicate the presence or expected absence of a digital watermark. In other implementations we provide a versatile document authenticator to toggle between watermarking and non-watermarking authentication processes depending on a detection trigger (100).

328 citations


Journal ArticleDOI
Hyungshin Kim1, Heung-Kyu Lee1
TL;DR: A robust image watermark based on an invariant image feature vector using normalized Zernike moments of an image as the vector and is robust with respect to geometrical distortions and compression.
Abstract: The paper introduces a robust image watermark based on an invariant image feature vector. Normalized Zernike moments of an image are used as the vector. The watermark is generated by modifying the vector. The watermark signal is designed with Zernike moments. The signal is added to the cover image in the spatial domain after the reconstruction process. We extract the feature vector from the modified image and use it as the watermark. The watermark is detected by comparing the computed Zernike moments of the test image and the given watermark vector. Rotation invariance is achieved by taking the magnitude of the Zernike moments. An image normalization method is used for scale and translation invariance. The robustness of the proposed method is demonstrated and tested using Stirmark 3.1. The test results show that our watermark is robust with respect to geometrical distortions and compression.

Journal ArticleDOI
W.C. Chu1
TL;DR: A DCT-based image watermarking algorithm is described, where the original image is not required for watermark recovery, and is achieved by inserting the watermark in subimages obtained through subsampling.
Abstract: A DCT-based image watermarking algorithm is described, where the original image is not required for watermark recovery, and is achieved by inserting the watermark in subimages obtained through subsampling.

Book
31 Jul 2003
TL;DR: Digital watermarking applications of digital watermarkings include still images, audio data and other media attacks, benchmarks and standardization other content protection mechanisms integrated content protection solutions conclusion as mentioned in this paper.
Abstract: Digital watermarking applications of digital watermarking digital watermarking for still images digital watermarking for audio data digital watermarking for other media attacks, benchmarks and standardization other content protection mechanisms integrated content protection solutions conclusion.

Journal ArticleDOI
TL;DR: A (k, n)-threshold visual cryptography scheme is proposed to encode a secret image into n shadow images, where any k or more of them can visually recover the secret image, but any k - 1 or fewer of them gain no information about it.

Journal ArticleDOI
01 Aug 2003
TL;DR: This paper presents an effective watermarking technique geared for relational data that is robust against various forms of malicious attacks as well as benign updates to the data and performs well enough to be used in real-world applications.
Abstract: .We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and delineate desirable properties of a watermarking system for relational data. We then present an effective watermarking technique geared for relational data. This technique ensures that some bit positions of some of the attributes of some of the tuples contain specific values. The specific bit locations and values are algorithmically determined under the control of a secret key known only to the owner of the data. This bit pattern constitutes the watermark. Only if one has access to the secret key can the watermark be detected with high probability. Detecting the watermark requires access neither to the original data nor the watermark, and the watermark can be easily and efficiently maintained in the presence of insertions, updates, and deletions. Our analysis shows that the proposed technique is robust against various forms of malicious attacks as well as benign updates to the data. Using an implementation running on DB2, we also show that the algorithms perform well enough to be used in real-world applications.

Patent
03 Jul 2003
TL;DR: A color mapping process enhances a watermark by computing a change in colors that is less visible for a given watermark strength as mentioned in this paper, which may be implemented efficiently with a 3D look up table.
Abstract: A color mapping process enhances a watermark by computing a change in colors that is less visible for a given watermark strength. The mapping process provides smooth transitions from one color region to another, and may be implemented efficiently with a 3D look up table. A user interface scheme enables the user to control encoding of the watermark in desired color regions.

Journal ArticleDOI
TL;DR: This Part I of a two-part paper addresses a number of fundamental issues of data hiding in image and video and proposes general solutions to them and proposes an adaptive solution switching between using constant embedding rate with shuffling and using variable embedding rates with embedded control bits.
Abstract: We address a number of fundamental issues of data hiding in image and video and propose general solutions to them. We begin with a review of two major types of embedding, based on which we propose a new multilevel embedding framework to allow the amount of extractable data to be adaptive according to the actual noise condition. We then study the issues of hiding multiple bits through a comparison of various modulation and multiplexing techniques. Finally, the nonstationary nature of visual signals leads to highly uneven distribution of embedding capacity and causes difficulty in data hiding. We propose an adaptive solution switching between using constant embedding rate with shuffling and using variable embedding rate with embedded control bits. We verify the effectiveness of our proposed solutions through analysis and simulation.

Patent
22 Jan 2003
TL;DR: In this article, the authors describe several video watermarking and fingerprinting enhancements, such as synchronizing watermark detectors with one-dimensional calibration signals, layering digital watermarks, watermarks for version control, compressed domain watermark, watermark of video object layers, key channel watermark embedding for video, robust fingerprinting of video, and scalable video.
Abstract: This disclosure describes several video watermarking and fingerprinting enhancements. These enhancements include synchronizing watermark detectors with one-dimensional calibration signals, layering digital watermarks, watermarks for version control, compressed domain watermarking, watermarking of video object layers, key channel watermark embedding for video, robust fingerprinting of video and watermarking of scalable video.

Proceedings ArticleDOI
09 Jun 2003
TL;DR: In this paper, a solution for relational database content rights protection through watermarking is proposed, which addresses important attacks, such as data re-sorting, subset selection, linear data changes (applying a linear transformation on arbitrary subsets of the data).
Abstract: Protecting rights over relational data is of ever increasing interest, especially considering areas where sensitive, valuable content is to be outsourced. A good example is a data mining application, where data is sold in pieces to parties specialized in mining it.Different avenues for rights protection are available, each with its own advantages and drawbacks. Enforcement by legal means is usually ineffective in preventing theft of copyrighted works, unless augmented by a digital counter-part, for example watermarking.Recent research of the authors introduces the issue of digital watermarking for generic number sets. In the present paper we expand on this foundation and introduce a solution for relational database content rights protection through watermarking.Our solution addresses important attacks, such as data re-sorting, subset selection, linear data changes (applying a linear transformation on arbitrary subsets of the data). Our watermark also survives up to 50% and above data loss.Finally we present wmdb.*, a proof-of-concept implementation of our algorithm and its application to real life data, namely in watermarking the outsourced Wal-Mart sales data that we have available at our institute.

Journal ArticleDOI
TL;DR: An asymptotically optimal detector is constructed based on well known results of the detection theory and experimental results prove the superiority of the proposed detector over the correlation detector.
Abstract: Most of the watermarking schemes that have been proposed until now employ a correlation detector (matched filter). The current paper proposes a new detector scheme that can be applied in the case of additive watermarking in the DCT (discrete cosine transform) or DWT (discrete wavelet transform) domain. Certain properties of the probability density function of the coefficients in these domains are exploited. Thus, an asymptotically optimal detector is constructed based on well known results of the detection theory. Experimental results prove the superiority of the proposed detector over the correlation detector.

Journal ArticleDOI
TL;DR: Experimental results show that the proposed watermarking algorithm is sustainable against compression algorithms such as MP3 and AAC, as well as common signal processing manipulation attacks.
Abstract: The paper presents the modified patchwork algorithm (MPA), a statistical technique for an audio watermarking algorithm in the transform (not only discrete cosine transform (DCT), but also DFT and DWT) domain. The MPA is an enhanced version of the conventional patchwork algorithm. The MPA is sufficiently robust to withstand some attacks defined by the Secure Digital Music Initiative (SDMI). Experimental results show that the proposed watermarking algorithm is sustainable against compression algorithms such as MP3 and AAC, as well as common signal processing manipulation attacks.

Journal ArticleDOI
TL;DR: In order to provide more watermarks and to minimize the distortion of the watermarked image, a novel technique using the combinational spatial and frequency domains is presented in this paper.

Journal ArticleDOI
TL;DR: This paper presents a new scheme for digital steganography of three-dimensional (3-D) triangle meshes that is robust against translation, rotation, and scaling operations, based on a substitutive procedure in the spatial domain.
Abstract: In this paper, we present a new scheme for digital steganography of three-dimensional (3-D) triangle meshes. This scheme is robust against translation, rotation, and scaling operations. It is based on a substitutive procedure in the spatial domain. The key idea is to consider a triangle as a two-state geometrical object. We discuss its performance in terms of capacity, complexity, visibility, and security. We validate the use of a principal component analysis (PCA) to make our scheme signal-dependent in the line of second generation watermarking scheme. We also define a simple specific metric for distortion evaluation that has been validated by many tests. We conclude by giving some other solutions, including open steganographic schemes that could be derived from the basic ideas presented here.

Patent
25 Apr 2003
TL;DR: In this article, the authors proposed a method to provide geo-location feedback corresponding to an image area selected by a user, and an alert engine to notify a network station that information associated with a digital watermark identifier is available.
Abstract: The present invention relates to image management systems and methods. In one implementation we provide a method to provide geo-location feedback corresponding to an image area selected by a user. A digital watermark embedded in the selected image area is decoded, and the decoded digital watermark includes or points to geo-location information associated with the selected image location. In another implementation we provide an alert engine to notify a network station that information associated with a digital watermark identifier is available.

Journal ArticleDOI
TL;DR: The robust optimum detection of multiplicative watermarks can be applied to copyright notification, enforcement, and broadcast monitoring and the square-root detector is designed and demonstrated to have near optimal performance for a large set of natural images and can be employed as a "universally optimal" detector or decoder for images and video.
Abstract: Digital watermarking is an emerging technique to protect data security and intellectual property right. Identification or verification of watermarking patterns can be achieved by detecting watermarks in received signals. However, one of the biggest challenges in watermarking detection is that the strengths of the watermark signals will change after being distorted by an attacker in a watermarking channel. Meanwhile, the embedding strengths may be adapted to the original signals, which are unknown at the receiver end. Further, the original signals are often highly non-Gaussian. Although some work has been done on optimum detection of watermarks, the uncertainty of watermark signal strengths and real statistical behavior of multimedia contents have not been taken into account simultaneously. Much more study is needed to enhance the performance of watermarking systems. Since multiplicative watermarks are robust and well suited for copyright protection, this paper presents our investigation on robust optimum detection of multiplicative watermarks. For sub-band transformed domains such as the discrete cosine transform (DCT), discrete wavelet transform (DWT), and pyramid transform, a class of generalized correlators is constructed based on the generalized Gaussian distributions. Thresholding methods to achieve a given false alarm rate, and the performance analyses are provided. The square-root detector is designed and demonstrated to have near optimal performance for a large set of natural images and can be employed as a "universally optimal" detector or decoder for images and video. The locally most powerful detection method is then extended to DFT domain multiplicative watermarking, with the magnitudes of coefficients modeled by the Weibull distributions. Another class of detectors is built based on this statistical modeling. The robust optimum detection of multiplicative watermarks can be applied to copyright notification, enforcement, and broadcast monitoring. We have applied the robust optimum watermarking detection to combined audio and video watermarking.

Patent
04 Feb 2003
TL;DR: In this paper, a signal is screened to compute detection values evincing presence and strength of the embedded signal, such as rejecting un-marked signals, improving synchronization of a reader used to extract hidden messages in suspect signals, determining authenticity of signals, and controlling use of the signals.
Abstract: To enhance decoding of signals suspected of containing an embedded auxiliary signal, a suspect signal is screened to compute detection values evincing presence and strength of the embedded signal. Screening strategies control detector actions, such as rejecting un-marked signals, improving synchronization of a reader used to extract hidden messages in suspect signals, determining authenticity of signals, and controlling use of the signals.

Journal ArticleDOI
TL;DR: Based on log-polar mapping (LPM) and phase correlation, the paper presents a novel digital image watermarking scheme that is invariant to rotation, scaling, and translation (RST).
Abstract: Based on log-polar mapping (LPM) and phase correlation, the paper presents a novel digital image watermarking scheme that is invariant to rotation, scaling, and translation (RST). We embed a watermark in the LPMs of the Fourier magnitude spectrum of an original image, and use the phase correlation between the LPM of the original image and the LPM of the watermarked image to calculate the displacement of watermark positions in the LPM domain. The scheme preserves the image quality by avoiding computing the inverse log-polar mapping (ILPM), and produces smaller correlation coefficients for unwatermarked images by using phase correlation to avoid exhaustive search. The evaluations demonstrate that the scheme is invariant to rotation and translation, invariant to scaling when the scale is in a reasonable range, and very robust to JPEG compression.

Proceedings ArticleDOI
26 Mar 2003
TL;DR: Steganography is a technique of hiding information in digital media as discussed by the authors, where the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown.
Abstract: Due to advances in ICT, most information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, steganography can be employed to secure information. Steganography is a technique of hiding information in digital media. In contrast to cryptography, the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video, and images.

Journal ArticleDOI
TL;DR: The results show that the proposed watermark scheme is robust to common signal distortions, including geometric manipulations, and robustness against scaling was achieved when the watermarked image size is scaled down to 0.4% of its original size.
Abstract: In recent years, digital watermarking techniques have been proposed to protect the copyright of multimedia data. Different watermarking schemes have been suggested for images. The goal of this paper is to develop a watermarking algorithm based on the discrete cosine transform (DCT) and image segmentation. The image is first segmented in different portions based on the Voronoi diagram and features extraction points. Then, a pseudorandom sequence of real numbers is embedded in the DCT domain of each image segment. Different experiments are conducted to show the performance of the scheme under different types of attacks. The results show that our proposed watermark scheme is robust to common signal distortions, including geometric manipulations. The robustness against Joint Photographic Experts Group (JPEG) compression is achieved for a compression ratio of up to 45, and robustness against average, median, and Wiener filters is shown for the 3/spl times/3 up to 9/spl times/9 pixel neighborhood. It is observed that robustness against scaling was achieved when the watermarked image size is scaled down to 0.4% of its original size.

Proceedings ArticleDOI
15 Oct 2003
TL;DR: It appears that by embedding both watermarks into one image, one could achieve extremely high robustness properties with respect to a large spectrum of image processing operations.
Abstract: The low-frequency embedding of the watermark increases the robustness with respect to image distortions that have low pass characteristics like filtering, lossy compression, geometrical distortions. On the other hand, oblivious schemes with low-frequency watermarks are more sensitive to modifications of the histogram, such as contrast/brightness adjustment, gamma correction, histogram equalization, and cropping. Watermarks inserted into middle and high frequencies are typically less robust to low-pass filtering lossy compression and small geometric deformations of the image, but are extremely robust with respect to noise adding, nonlinear deformations of the gray scale. It is understandable that the advantages and disadvantages of low and middle-to-high frequency watermarks are complementary. It appears that by embedding both watermarks into one image, one could achieve extremely high robustness properties with respect to a large spectrum of image processing operations. The above reasoning leads to proposed technique of embedding multiple watermarks into the low frequency and high frequency bands of discrete wavelet transform.