Advertisement

Shedding More Light on Image Watermarks

  • Juan Ramón Hernández
  • Fernando Pérez-González
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Abstract

In this paper a general model of a watermarking system for copyright protection of outputs from an arbitrary source is presented. This model is proposed as a framework for an information-theoretical analysis of watermarking schemes. The main elements which comprise such schemes are described, performance measures are defined and important issues such as imperceptibility, robustness and cryptographic security are discussed. The application of concepts such as channel capacity, authentication and secrecy in the context of watermarking is also discussed. As a particular case, a spatial-domain image watermarking system based on direct sequence spread spectrum modulation techniques is described. Special enphasis is placed in discussing the analogies and differences between spread spectrum communication systems and watermarking applications.

Keywords

Image Watermark Spread Spectrum Watermark Scheme Pseudorandom Sequence Synchronization Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    M. D. Swanson, B. Zhu, and A. H. Tewfik, “Robust data hiding for images,” in Proc. IEEE Digital Signal Processing Workshop, (Loen, Norway), pp. 37–40, September 1996.Google Scholar
  2. 2.
    F. Hartung and B. Girod, “Digital watermarking of raw and compressed video,” in Digital Compression Technologies and Systems for Video Communications (N. Ohta, ed.), vol. 2952, pp. 205–213, SPIE Proceedings Series, October 1996.Google Scholar
  3. 3.
    I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” Tech. Rep. 95-10, NEC Research Institute, Princeton, NJ, USA, 1995.Google Scholar
  4. 4.
    M. D. Swanson, B. Zhu, and A. H. Tewfik, “Transparent robust image watermarking,” in Proc. IEEE Int. Conf. on Image Processing, vol. III, (Lausanne, Switzerland), pp. 211–214, September 1996.Google Scholar
  5. 5.
    F. M. Boland, J. J. K. O. Ruanaidh, and C. Dautzenberg, “Watermarking digital images for copyright protection,” in IEE International Conference on Image Processing and its Applications, (Edinburgh), pp. 326–330, 1995.Google Scholar
  6. 6.
    G. J. Simmons, “Authentication theory / coding theory,” in Advances in Cryptology: Proceedings of CRYPTO84 (G. R. Blakley and D. Chaum, eds.), pp. 411–431, Springer Verlag, 1985.Google Scholar
  7. 7.
    G. J. Simmons, “A survey of information authentication,” Proc. IEEE, vol. 76, pp. 603–620, May 1988.Google Scholar
  8. 8.
    C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech J., vol. 28, pp. 565–715, October 1949.Google Scholar
  9. 9.
    R. Ahlswede and G. Dueck, “Identification via channels,” IEEE Trans. Inform. Theory, vol. 35, pp. 15–29, January 1989.Google Scholar
  10. 10.
    T. S. Han and S. VerdÚ, “New results in the theory of identification via channels,” IEEE Trans. Inform. Theory, vol. 38, pp. 14–25, January 1992.Google Scholar
  11. 11.
    J. R. Hernández, F. Pérez-González, J. M. Rodríguez, and G. Nieto, “Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images.” to be published in IEEE J. Select. Areas Commun., April 1998.Google Scholar
  12. 12.
    J. S. Lim, Two-Dimensional Signal and Image Processing. Prentice-Hall, 1990.Google Scholar
  13. 13.
    D. R. Martin and P. L. McAdam, “Convolutional code performance with optimal jamming,” in Conf. Rec. Int. Conf. Commun., pp. 4.3.1–4.3.7, May 1980.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Juan Ramón Hernández
    • 1
  • Fernando Pérez-González
    • 1
  1. 1.Departamento de Tecnoloxías das Comunicacións E.T.S.I. TelecomunicaciónUniversidad de Vigo, VigoPontevedraSpain

Personalised recommendations