Robust Digital Watermarking Based on Key-Dependent Basis Functions

  • Jiri Fridrich
  • Arnold C. Baldoza
  • Richard J. Simard
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)


In this paper, we introduce the concept of key-dependent basis functions and discuss its applications to secure robust watermarking for copyright protection and to designing secure public black-box watermark detectors. The new schemes overcome a possible security weakness of global, non-adaptive schemes that apply watermark patterns spanned by a small number of publicly known basis functions. The watermark is embedded into the projections of an image onto the secret set of key-dependent functions (patterns). The robustness of the watermarking scheme with respect to filtering, lossy compression, and combinations of many other attacks is studied. Finally, we propose a candidate for a watermarking scheme that enables the construction of a secure public watermark detector.


Robust image watermarking attacks orthogonal patterns secure public watermark detector 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia,” NEC Research Institute, Technical Report 95-10.Google Scholar
  2. 2.
    I.J. Cox and M.L. Miller, “A review of watermarking and the importance of perceptual modeling”, Proceedings of Electronic Imaging’97, February 1997.Google Scholar
  3. 3.
    M.D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data Embedding and Watermarking Technologies”, Invited Paper, to appear in the Proceedings of the IEEE, 1998.Google Scholar
  4. 4.
    A.H. Tewfik, M.D. Swanson, B. Zhu, K. Hamdy, and L. Boney, “Transparent Robust Watermarking for Images and Audio.” IEEE Trans. on Signal Proc., 1996.Google Scholar
  5. 5.
    J.-F. Delaigle, C. De Vleeschouwer, B. Macq, “Digital watermarking of images,” Proceedings of the IS&T/SPIE Symposium on Electronic Imaging Science and Technology, 1996.Google Scholar
  6. 6.
    N. Jayant, J. Johnston, and R. Safranek, “Signal Compression Based on Models of Human Perception”, Proceedings of the IEEE, Vol. 81, No. 10, Oct 1993.Google Scholar
  7. 7._N. Jayant, J. Johnston, and R. Safranek, “Perceptual Coding of Images”, SPIE Vol. 1913, 1993.Google Scholar
  8. 8.
    B. Zhu and A.H. Tewfik, “Low Bit Rate Near-Transparent Image Coding”, SPIE Vol. 2491, 1995.Google Scholar
  9. 9.
    B.O. Comiskey and J.R. Smith, “Modulation and Information Hiding in Images,” in: Information Hiding, First International Workshop, edited by Ross J Anderson. Cambridge, U.K., May 30–June 1, 1996, Proceedings. Lecture Notes in Computer Science, Vol. 1174, Springer-Verlag, 1996.Google Scholar
  10. 10.
    Hartung and B. Girod, “Digital Watermarking of Raw and Compressed Video”, Proc. European EOS/SPIE Symposium on Advanced Imaging and Network Technologies, Berlin, Germany, Oct. 1996.Google Scholar
  11. 11.
    I.J. Cox and Jean-Paul M.G. Linnartz, “Public watermarks and resistance to tampering”, in Proceedings of the ICIP, October 1997, CD version of Proceedings.Google Scholar
  12. 12.
    I.J. Cox and Jean-Paul M.G. Linnartz, “Some general methods for tampering with watermarks”, preprint, 1998.Google Scholar
  13. 13.
    T. Kalker, “Watermark Estimation Through Detector Observation”, Philips Research Eindhoven, Netherland, preprint 1998.Google Scholar
  14. 14.
    T. Kalker, J.P. Linnartz and M. van Dijk, “Watermark Estimation Through Detector Analysis”, preprint submitted to ICIP-98.Google Scholar
  15. 15.
    J.P. Linnartz and M. van Dijk, “Analysis of the sensitivity attack against electronic watermarks in images”, in Proceedings of the Workshop on Information Hiding, Portland, April 1998, submitted.Google Scholar
  16. 16.
    S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. “Can invisible watermarks resolve rightful ownerships?” Proceedings of the IS&T/SPIE Conference on Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, Feb. 13–14, 1997, vol. 3022, pp. 310–321.Google Scholar
  17. 17.
    M.G. Kuhn and F.A.P. Petitcolas, StirMark Google Scholar
  18. 18.
    Unzign1997.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Jiri Fridrich
    • 1
  • Arnold C. Baldoza
    • 2
  • Richard J. Simard
    • 2
  1. 1.Center for Intelligent SystemsSUNY BinghamtonBinghamton
  2. 2.Air Force Research Laboratory/IFECRome

Personalised recommendations