Secure spread spectrum watermarking for multimedia

@article{Cox1997SecureSS,
  title={Secure spread spectrum watermarking for multimedia},
  author={Ingemar J. Cox and Joe Kilian and Frank Thomson Leighton and Talal Shamoon},
  journal={IEEE transactions on image processing : a publication of the IEEE Signal Processing Society},
  year={1997},
  volume={6 12},
  pages={
          1673-87
        }
}
  • I. Cox, J. Kilian, T. Shamoon
  • Published 1 December 1997
  • Computer Science
  • IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. [] Key Result Experimental results are provided to support these claims, along with an exposition of pending open problems.
A DCT-domain system for robust image watermarking
Digital Watermarking, Fingerprinting and Compression: An Information-Theoretic Perspective
TLDR
This thesis proves coding theorems that establish the rate region in the following cases: (a) general i.d. image distributions, distortion constraints and memoryless attacks, (b) memoryless attacks combined with collusion (for fingerprinting applications), and (c)—not necessarily stationary or ergodic—Gaussian image distributions and attacks, and average quadratic distortion constraints.
Resistance of digital watermarks to collusive attacks
TLDR
Cox et al. have proposed the use of additive normally distributed values as watermarks, and have sketched an argument showing that, in a certain theoretical model, such watermarks are resistant to collusive attacks, and here the mathematical justification for this claim is filled in.
A DCT-Domain System for Digital Watermarking
TLDR
A new DCT-domain system for digital watermarking algorithm for digital images is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of scrambled image in a selected set of DCT coefficients, thus ensuring the watermark invisibility.
Robust transparent image watermarking system with spatial mechanisms
  • P. Lin
  • Computer Science
    J. Syst. Softw.
  • 2000
Image-adaptive watermarking using visual models
TLDR
This work proposes perceptually based watermarking schemes in two frameworks: the block-based discrete cosine transform and multiresolution wavelet framework and discusses the merits of each one, which are shown to provide very good results both in terms of image transparency and robustness.
Low Frequency Component-Based Watermarking Scheme using
TLDR
Invisible watermarks are embedded in the transform domain to enhance the robustness of the watermarking scheme and are shown to carry significant information and are robust to many image manipulations.
Equalized-spectrum Watermarking Using Perceptual Modeling
TLDR
This paper presents a method that reduces the perceptibility of a robust watermarking scheme, viz. equalized-spectrum water marking, using human visual models.
A Secure Wavelet based Watermarking Approach using Psycho-Visual Redundancy in Image
  • Ashish Sinha, J. Panda
  • Computer Science
    2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS)
  • 2021
TLDR
This paper proposes a secure approach for watermarking using the Image Partitioning approach, which exploits the psycho-visual redundancy in the image to embed the watermark, and frequency domain embedding leads to better robustness and stability.
A novel image watermarking approach
  • Erol Duymaz, A. Akan
  • Computer Science
    2013 6th International Conference on Recent Advances in Space Technologies (RAST)
  • 2013
TLDR
The results show that an embedded watermark is not easily detectable using either the HVS or other techniques, but can be detected successfully in the simulation domain, but it may be susceptible to some noise and channel limitations in the real world.
...
...

References

SHOWING 1-10 OF 49 REFERENCES
Secure spread spectrum watermarking for images, audio and video
TLDR
The watermark can be constructed to make counterfeiting almost impossible, and the same digital watermarking algorithm can be applied to all three media under consideration with only minor modifications, making it especially appropriate for multimedia products.
A Secure, Robust Watermark for Multimedia
TLDR
A digital watermarking method for use in audio, image, video and multimedia data that is robust to common signal distortions and malicious attack, and can be constructed to make counterfeiting almost impossible.
Review of watermarking and the importance of perceptual modeling
TLDR
The desirable characteristics of digital watermarking are outlined and several recent approaches that address these issues are discussed.
Watermarking digital images for copyright protection
TLDR
The requirements that an effective image watermarking scheme must possess are specified, followed by a review of current and novel techniques based on image transforms.
Watermarking Document Images with Bounding Box Expansion
TLDR
Experimental results are presented which show that bounding box expansions as small as 1/300 inch can be reliably detected, even after the distortions introduced by noisy image reproduction devices such as plain paper copiers.
Collusion-Secure Fingerprinting for Digital Data
TLDR
This paper discusses methods for assigning code-words for the purpose of fingerprinting digital data, e.g., software, documents, music, and video, and presents a general fingerprinting solution which is secure in the context of collusion.
Techniques for data hiding
TLDR
This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.
Cryptology for digital TV broadcasting
TLDR
The description of a conditional access system is given and it is shown that equitable systems need the use of a trusted third party.
A method for obtaining digital signatures and public-key cryptosystems
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important
Embedding secret information into a dithered multi-level image
TLDR
A coding scheme for secretly embedding character information into a dithered multilevel image is presented, and this scheme is available for storing a picture in a database or communication system with secret information.
...
...