Abstract
In this paper, we propose to use multi-layers neural networks (MLNN) architectures to build public detection functions that approach the detection performance of secret key watermarking. The attractive properties of MLNN for public key watermarking are revealed by a theoretical analysis of linear MLNN. With some approximations, the detection performance of non-linear MLNN, which offer more resistance to attacks, can also be predicted. Experiments on simulated data confirm the theoretical analysis. Also, experiments on real data demonstrate that the selected detection functions are resistant to JPEG compression. Overall, this paper should bring optimism regarding the practical existence of public key watermarking schemes.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
B. Chen and G. W. Wornell. Dither modulation: A new approach to digital watermarking and information embedding. In Proc. of SPIE: Security and Watermarking of Multimedia Contents, volume 3657, pages 342–353, 1999.
I. J. Cox and J. P. M. G. Linnartz. Public watermarks and resistance to tampering. In International Conference on Image Processing, 1997.
J. J. Eggers, J. K. Su, and B. Girod. Asymmetric watermarking schemes. In Tagung-band des GlWorkshops, 2000.
J. J. Eggers, J. K. Su, and B. Girod. Public key watermarking by eigenvectors of linear transforms. In EUSIPCO, 2000.
T. Furon and P. Duhamel. An asymmetric public detection scheme. In Information Hiding Workshop, pages 88–100, 1999.
T. Furon and P. Duhamel. Robustness of asymmetric watermarking technique. In IEEE International Conference on Image Processing, volume 3, pages 21–24, 2000
J. R. Hernandez, M. Amado, and F. Perez-Gonzalez. Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on Image Processing, 9(l):55–68, 2000.
T. Kalker, J. P. M. G. Linnartz, and M. van Dijk. Watermark estimation through detector analysis. In International Conference on Image Processing, 1998.
J. P. M. G. Linnartz and M. van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In Workshop on Information Hiding, 1998.
J. Picard and A. Robert. On the public key watermarking issue. In Proc. of SPIE: Security and Watermarking of Multimedia Contents, volume 3971, 2001
A. Robert and J. Picard. Masking models and watermark unDetection. In Proc. of SPIE: Security and Watermarking of Multimedia Contents, volume 3971, 2001.
J. R. Smith and C. Dodge. Developments in steganography. In Information Hiding Workshop, pages 77–87, 1999.
R. G. van Schyndel, A. Z. Tirkel, and I. D. Svalbe. Key independent watermark detection. In Proceedings of the IEEE Intl. Conference on Multimedia Computing and Systems, volume 1, Florence, Italy, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Picard, J., Robert, A. (2001). Neural Networks Functions for Public Key Watermarking. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_11
Download citation
DOI: https://doi.org/10.1007/3-540-45496-9_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42733-9
Online ISBN: 978-3-540-45496-0
eBook Packages: Springer Book Archive