Results 1 - 10
of
42
Information Hiding -- A Survey
, 1999
"... Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised ..."
Abstract
-
Cited by 280 (0 self)
- Add to MetaCart
Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity; and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field; of what we know, what works, what does not, and what are the interesting topics for research.
A Fair Benchmark for Image Watermarking Systems
, 1999
"... Since the early 90's a number of papers on "robust" digital watermarking systems have been presented but none of them uses the same robustness criteria. This is not practical at all for comparison and slows down progress in this area. To address this issue, we present an evaluation pr ..."
Abstract
-
Cited by 141 (5 self)
- Add to MetaCart
Since the early 90's a number of papers on "robust" digital watermarking systems have been presented but none of them uses the same robustness criteria. This is not practical at all for comparison and slows down progress in this area. To address this issue, we present an evaluation procedure of image watermarking systems. First we identify all necessary parameters for proper benchmarking and investigate how to quantitatively describe the image degradation introduced by the watermarking process. For this, we show the weaknesses of usual image quality measures in the context watermarking and propose a novel measure adapted to the human visual system. Then we show how to e#ciently evaluate the watermark performance in such a way that fair comparisons between di#erent methods are possible. The usefulness of three graphs: "attack vs. visual-quality," "bit-error vs. visual quality," and "bit-error vs. attack" are investigated. In addition the receiver operating characteristic (ROC) graphs are reviewed and proposed to describe statistical detection behavior of watermarking methods. Finally we review a number of attacks that any system should survive to be really useful and propose a benchmark and a set of di#erent suitable images.
Circularly Symmetric Watermark Embedding In 2-D Dft Domain
- in 2-D DFT Domain,” Proceedings of the 1999 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP
, 1999
"... This paper presents an algorithm for rotation and scale invariant watermarking of digital images. An invisible mark is embedded in magnitude of the DFT domain. It is robust to compression, filtering, cropping, translation and rotation. The watermark introduces image changes that are invisible to the ..."
Abstract
-
Cited by 67 (6 self)
- Add to MetaCart
(Show Context)
This paper presents an algorithm for rotation and scale invariant watermarking of digital images. An invisible mark is embedded in magnitude of the DFT domain. It is robust to compression, filtering, cropping, translation and rotation. The watermark introduces image changes that are invisible to the human eye. The detection algorithm does not require the original image. 1. INTRODUCTION Digital products can be easily copied and reproduced in a network enviroment. Therefore the watermarking of the multimedia products has been essential for copyright protection. A digital watermark is a digital signal carrying information about the copyright owner and it is expected to be permanently embedded into the digital products. In the following, we shall limit our presentation to digital image protection. The watermark should be robust to distortions (such as image processing and lossy image compression) and statistically undetectable. In order to be robust, it must be associated to the most sign...
Towards blind detection of robust watermarks in polygonal models
- in Proc. Eurographics, Computer Graphics Forum
, 2000
"... We describe a Digital Watermarking system dedicated for embedding watermarks into 3D polygonal models. The system consists of three watermarking algorithms, one named Vertex Flood Algorithm (VFA) suitable for embedding fragile public readable watermarks with high capacity and offering a way of model ..."
Abstract
-
Cited by 40 (1 self)
- Add to MetaCart
We describe a Digital Watermarking system dedicated for embedding watermarks into 3D polygonal models. The system consists of three watermarking algorithms, one named Vertex Flood Algorithm (VFA) suitable for embedding fragile public readable watermarks with high capacity and offering a way of model authentication, one realizing affine invariant watermarks, named Affine Invariant Embedding (AIE) and a third one, named Normal Bin Encoding (NBE) algorithm, realizing watermarks with robustness against more complex operations, most noticeably polygon reduction. The watermarks generated by these algorithms are stackable. We shortly discuss the implementation of the system, which is realized as a 3D Studio MAX plugin. 1.
Digital Image Watermarking using Mixing Systems
- Computer & Graphics
, 1998
"... This paper presents a watermarking scheme for copyright protection of digital images. A binary logo is the copyright label which is embedded in grayscale or color digital images. A set of integer parameters, selected by the legal owner, controls the watermarking algorithm via a strongly chaotic (mix ..."
Abstract
-
Cited by 29 (10 self)
- Add to MetaCart
(Show Context)
This paper presents a watermarking scheme for copyright protection of digital images. A binary logo is the copyright label which is embedded in grayscale or color digital images. A set of integer parameters, selected by the legal owner, controls the watermarking algorithm via a strongly chaotic (mixing) system. Watermark detection is performed without resorting to the original image. The embedded binary logo is reconstructed or the statistical detection certainty is provided indicating the watermark existence. Numerical experiments testify the efficiency of a particular watermarking algorithm as a reliable verification tool for proving copyright ownership of the digital image. 1 Introduction Copyright protection of digital images, audio and video, is a novel and very interesting research topic. The technology of digital services grows rapidly and distributed access to such services through computer networks is a matter of urgency. However, network access does not protect the intellect...
Digital Image Watermarking: An Overview
- IEEE International Conference on Multimedia Computing and Systems
"... ..."
(Show Context)
Blind quality assessment system for multimedia communications using tracing watermarking
- IEEE Trans. Signal Processing
, 2003
"... Abstract—This paper presents a novel method to blindly estimate the quality of a multimedia communication link by means of an unconventional use of digital fragile watermarking. Data hiding by digital watermarking is usually employed for multimedia copyright protection, authenticity verification, or ..."
Abstract
-
Cited by 11 (1 self)
- Add to MetaCart
Abstract—This paper presents a novel method to blindly estimate the quality of a multimedia communication link by means of an unconventional use of digital fragile watermarking. Data hiding by digital watermarking is usually employed for multimedia copyright protection, authenticity verification, or similar purposes. However, watermarking is here adopted as a technique to provide a blind measure of the quality of service in multimedia communications. Specifically, a fragile watermark is hidden in an MPEG-like host data video transport stream using a spread-spectrum approach. Like a tracing signal, the watermark tracks the data, where it is embedded, since both the watermark and the host data follow the same communication link. The estimation of the tracing watermark allows dynamically evaluating the effective quality of the provided video services. This depends on the whole physical layer, including the employed video co/decoder. The performed method is based on the evalu-ation of the mean-square-error between the estimated and the actual watermarks. The proposed technique has been designed for application to wireless multimedia communication systems. According to the results obtained, the sensitivity of the detected tracing watermark on the quality of service (QoS) indices provides for some useful capabilities for analyzing future mobile Universal Mobile Telecommunications System (UMTS) services. Index Terms—Multimedia communications, quality of service, UMTS services, video streaming, watermarking. I.
Fair Evaluation Methods for Image Watermarking Systems
, 2000
"... Since the early 90's a number of papers on "robust" digital watermarking systems have been presented but none of them uses the same robustness criteria. This is not practical at all for comparison and slows down progress in this area. To address this issue, we present an evaluation pr ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Since the early 90's a number of papers on "robust" digital watermarking systems have been presented but none of them uses the same robustness criteria. This is not practical at all for comparison and slows down progress in this area. To address this issue, we present an evaluation procedure of image watermarking systems. First we identify all necessary parameters for proper benchmarking and investigate how to quantitatively describe the image degradation introduced by the watermarking process. For this, we show the weaknesses of usual image quality measures in the context watermarking and propose a novel measure adapted to the human visual system. Then we show how to efficiently evaluate the watermark performance in such a way that fair comparisons between different methods are possible. The usefulness of three graphs: "attack vs. visual-quality," "bit-error vs. visual quality," and "bit-error vs. attack" are investigated. In addition the receiver operating characteristic (ROC) graphs are reviewed and proposed to describe statistical detection behavior of watermarking methods. Finally we review a number of attacks that any system should survive to be really useful and propose a benchmark and a set of different suitable images.
Watermarking and authentication of color images based on segmentation of the xyy color space
- Journal of Imaging Science and Technology, 2005
"... In this paper we propose a new strategy of watermarking which extends the principle of histogram specification to color histogram. The proposed scheme embeds into a color image a color watermark from either the xy chromatic plane or the xyY color space. The scheme resists geometric attacks (e.g., ro ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
(Show Context)
In this paper we propose a new strategy of watermarking which extends the principle of histogram specification to color histogram. The proposed scheme embeds into a color image a color watermark from either the xy chromatic plane or the xyY color space. The scheme resists geometric attacks (e.g., rotation, scaling, etc.,) and, within some limits, JPEG compression. The scheme uses a secret binary pattern, or combines some patterns generated by a secret key in order to modify the chromatic distribution of an image. By using the inverse pattern, the watermark is detected without knowing the original image. Examples of images and attacks are given to illustrate the relevance of the proposed approach, i.e., its invisibility and its robustness. In the second part of this paper we investigate the usefulness of our watermarking approach for color image authentication. Several experiments are presented to show that our scheme ensures image authentication, detects tampered regions in case of malicious attacks and ensures a certain degree of robustness to common image ma-nipulations like JPEG compression, etc. Compared with other blind authentication schemes, the experiments show that, the detection ability, the invisibility, as well as the robustness to some common image processing are improved. 1
Statistical Analysis of a Watermarking System based on Bernoulli Chaotic Sequences
, 2000
"... The paper deals with the statistical analysis of the behaviour of a blind copyright protection watermarking system based on chaotic watermark signals generated by n-way Bernoulli shift maps. The analysis involves theoretical evaluation of the system detection reliability, when a correlator detector ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
The paper deals with the statistical analysis of the behaviour of a blind copyright protection watermarking system based on chaotic watermark signals generated by n-way Bernoulli shift maps. The analysis involves theoretical evaluation of the system detection reliability, when a correlator detector is used. The effect of distortions (lowpass filtering, noise corruption of the watermarked data) on the detection reliability is also theoretically investigated. The system is modeled in a communication framework considering the signal as interference and converting the addressed problem to the detection of the underlying watermark signal. The aim of the paper is two-fold: (i) to introduce the n-way Bernoulli shift generated chaotic watermarks and theoretically contemplate their properties with respect to detection reliability and (ii) to theoretically establish their potential superiority against the widely used (pseudo-)random watermarks. An important property of Bernoulli watermarks is their controllable...