Secure spread spectrum watermarking for multimedia

@article{Cox1997SecureSS,
  title={Secure spread spectrum watermarking for multimedia},
  author={Ingemar J. Cox and Joe Kilian and Frank Thomson Leighton and Talal Shamoon},
  journal={IEEE transactions on image processing : a publication of the IEEE Signal Processing Society},
  year={1997},
  volume={6 12},
  pages={
          1673-87
        }
}
  • I. CoxJ. Kilian T. Shamoon
  • Published 1 December 1997
  • Computer Science
  • IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. [] Key Result Experimental results are provided to support these claims, along with an exposition of pending open problems.

A DCT-domain system for robust image watermarking

Digital Watermarking, Fingerprinting and Compression: An Information-Theoretic Perspective

This thesis proves coding theorems that establish the rate region in the following cases: (a) general i.d. image distributions, distortion constraints and memoryless attacks, (b) memoryless attacks combined with collusion (for fingerprinting applications), and (c)—not necessarily stationary or ergodic—Gaussian image distributions and attacks, and average quadratic distortion constraints.

Resistance of digital watermarks to collusive attacks

Cox et al. have proposed the use of additive normally distributed values as watermarks, and have sketched an argument showing that, in a certain theoretical model, such watermarks are resistant to collusive attacks, and here the mathematical justification for this claim is filled in.

Robust transparent image watermarking system with spatial mechanisms

  • P. Lin
  • Computer Science
    J. Syst. Softw.
  • 2000

Image-adaptive watermarking using visual models

This work proposes perceptually based watermarking schemes in two frameworks: the block-based discrete cosine transform and multiresolution wavelet framework and discusses the merits of each one, which are shown to provide very good results both in terms of image transparency and robustness.

Low Frequency Component-Based Watermarking Scheme using

Invisible watermarks are embedded in the transform domain to enhance the robustness of the watermarking scheme and are shown to carry significant information and are robust to many image manipulations.

Equalized-spectrum Watermarking Using Perceptual Modeling

This paper presents a method that reduces the perceptibility of a robust watermarking scheme, viz. equalized-spectrum water marking, using human visual models.

A Secure Wavelet based Watermarking Approach using Psycho-Visual Redundancy in Image

  • Ashish SinhaJ. Panda
  • Computer Science
    2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS)
  • 2021
This paper proposes a secure approach for watermarking using the Image Partitioning approach, which exploits the psycho-visual redundancy in the image to embed the watermark, and frequency domain embedding leads to better robustness and stability.

A novel image watermarking approach

  • Erol DuymazA. Akan
  • Computer Science
    2013 6th International Conference on Recent Advances in Space Technologies (RAST)
  • 2013
The results show that an embedded watermark is not easily detectable using either the HVS or other techniques, but can be detected successfully in the simulation domain, but it may be susceptible to some noise and channel limitations in the real world.

Robust Watermarking Schemes for Digital Images

It is shown that the two proposed watermarking schemes developed in this thesis provide a performance superior to that of the existing schemes in terms of robustness against various types of attacks while preserving the perceptual quality of the cover image.
...

References

SHOWING 1-10 OF 49 REFERENCES

Secure spread spectrum watermarking for images, audio and video

The watermark can be constructed to make counterfeiting almost impossible, and the same digital watermarking algorithm can be applied to all three media under consideration with only minor modifications, making it especially appropriate for multimedia products.

A Secure, Robust Watermark for Multimedia

A digital watermarking method for use in audio, image, video and multimedia data that is robust to common signal distortions and malicious attack, and can be constructed to make counterfeiting almost impossible.

Review of watermarking and the importance of perceptual modeling

The desirable characteristics of digital watermarking are outlined and several recent approaches that address these issues are discussed.

A digital watermark

The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such

Watermarking digital images for copyright protection

The requirements that an effective image watermarking scheme must possess are specified, followed by a review of current and novel techniques based on image transforms.

Modulation and Information Hiding in Images

The amount of information that can be hidden, its perceptibility, and its robustness to removal can be modeled using the quantities channel capacity, signal-to-noise ratio, and jamming margin, and the theory indicates the most aggressive feasible parameter settings.

Watermarking Document Images with Bounding Box Expansion

Experimental results are presented which show that bounding box expansions as small as 1/300 inch can be reliably detected, even after the distortions introduced by noisy image reproduction devices such as plain paper copiers.

Collusion-Secure Fingerprinting for Digital Data

This paper discusses methods for assigning code-words for the purpose of fingerprinting digital data, e.g., software, documents, music, and video, and presents a general fingerprinting solution which is secure in the context of collusion.

Techniques for data hiding

This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.

Embedding Robust Labels into Images for Copyright Protection

A set of novel steganographic methods to secretly embed robust labels into image data for identifying image copyright holder and original distributor in digital networked environment and can survive processing which does not seriously reduce the quality of the image.