Advertisement

Testing Digital Watermark Resistance to Destruction

  • Sabrina Sowers
  • Abdou Youssef
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Abstract

Digital watermarking is the steganographic technique used to discourage the unauthorized distribution of digital media such as text, audio, still images, and video. Artists, publishers and any other individual or business that has a commercial interest in preventing illegal copies of their work are in need of a way to achieve this. There are commercial techniques available on the Internet (like Steganos) and other techniques that are being researched. A desirable watermark is undetectable and can always be recovered. The ability to be recoverable is of concern, since if the watermark is easily destroyed it is useless. This paper investigates three known steganographic algorithms with respect to their robustness against four image processing operations: filtering, bitplane removal, DCT compression, and quantization. It is found that those steganographic algorithms often fail to recover the watermarks after the four image processing operations are performed.

Keywords

Discrete Cosine Transform Digital Medium Digital Watermark Watermark Technique Watermark Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Raymond B. Wolfgang and Edward J. Delp. “Overview of image security techniques with applications in multimedia systems”. http://www.dynamo.ecn.purdue.edu/~ace/water/digwmk.html
  2. 2.
    R. G. van Schyndel, A. Z. Tirkel, C. F. Osborne. “A Digital Watermark”, Proceedings of the International Conference on Image Processing, November, 1994, Austin, Texas, vol. 2, pp. 86–90.Google Scholar
  3. 3.
    Ross Anderson and Fabien Petitcolas. “On the Limits of Steganography”. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright & Privacy Protection, vol. 16 no. 4, pp 474–481, May 1998. http://www.cl.cam.ac.uk/~fapp2/papers/jsac98-limsteg/ CrossRefGoogle Scholar
  4. 4.
    Walter Bender, Daniel Gruhl and Norishige Morimoto. “Techniques for Data Hiding”. Proceedings of the SPIE, volume 2420, February 1995, p. 40.Google Scholar
  5. 5.
    E. Koch and Z. Zhao. “Towards Robust and Hidden Image Copyright Labeling”. Proceedings of the 1995 IEEE Workshop on Non-Linear Signal and Image Processing, June 1995.Google Scholar
  6. 6.
    I. Pitas. “A Method for Signature Casting on Digital Images”. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 215–218.Google Scholar
  7. 7.
    I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. “Secure Spread Spectrum Watermarking for Images, Audio, and Video”. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 243–246.Google Scholar
  8. 8.
    J. J. K. ó. Ruanaidh, W. J. Dowling, and F. M. Boland. “Phase Watermarking of Digital Images”. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 239–242.Google Scholar
  9. 9.
    Christine Podilchuk and Wenjun Zeng. “Perceptual Watermarking of Still Images”. Proceedings of the IEEE MMSP Workshop, Princeton, June 1997, pp. 363–368.Google Scholar
  10. 10.
    Christine Podilchuk and Wenjun Zeng. “Watermarking of the JPEG Bitstream”. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST’ 97 International Conference, pp. 253–260.Google Scholar
  11. 11.
    Raymond B. Wolfgang and Edward J. Delp. “A Watermarking Technique for Digital Imagery: Further Studies”. Proceedings of the International Conference on Imaging Science, System, and Technology. CISST’ 97 International Conference, pp. 279–284.Google Scholar
  12. 12.
    Tsung-Li Wu and S. Felix Wu. “Selective Encryption and Watermarking of MPEG Video”. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST’ 97 International Conference, pp. 261–269.Google Scholar
  13. 13.
    Dave Benham, Nasir Memon, et. al. “Fast Watermarking of DCT-based Compressed Images”. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST’ 97 International Conference, pp. 243–252.Google Scholar
  14. 14.
    R. Wolfgang and E. Delp. “A Watermark for Digital Images”. Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16–19, 1996, volume 3, pp. 219–222.Google Scholar
  15. 15.
    Birgit Pfitzmann. “Information Hiding Terminology”. Proceedings of Information Hiding. Springer Lecture Notes in Computer Science, volume 1174 (1996), pp. 347–350.CrossRefGoogle Scholar
  16. 16.
    Ross Anderson. “Stretching the Limits of Steganography”. In Proceedings of the First Workshop on Information Hiding, 1996, pp. 39–48 http://www.cl.cam.ac.uk/ftp/users/rja14/stegan.ps.gz
  17. 17.
    M. Yeung and F. C. Mintzer. “Digital Watermarking for High Quality Images”. 1997 IEEE Proceedings of the International Conferences on Image Processing, pp. 357–362.Google Scholar
  18. 18.
    J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman. “Electronic Marking and Identification Techniques to Discourage Document Copying”. Proceedings of Infocom’ 94, pp. 1278–1287, 1994.Google Scholar
  19. 19.
    Richard Wiggins. “Stop Those Copyright Claim Jumpers!: Corralling Your Content”. NewMedia, http://www.newmedia.com, pp. 40–44, October 13, 1997.
  20. 20.
    R. Gonzalez and R. Woods. Digital Image Processing. Second Edition. Addison-Wesley Publishing, 1993.Google Scholar
  21. 21.
    Peter Wayner. Digital Copyright Protection. AP Professional, Chestnut Hill, Massachusetts, 1997.Google Scholar
  22. 22.
    M. Swanson, B. Zhu and A. Tewfik. “Transparent Robust Image Watermarking”. Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16–19, 1996, volume 3, pp. 211–214.Google Scholar
  23. 23.
    Khalid Sayood. Introduction to Data Compression. Morgan Kaufman Publishers, Inc., San Francisco, California, 1996.zbMATHGoogle Scholar
  24. 24.
    Majid Rabbani and Paul W. Jones. Digital Image Compression Techniques. SPIE Optical Engineering Press, Bellingham Washington, 1991.CrossRefGoogle Scholar
  25. 25.
    Hal Berghel. “Watermarking Cyberspace”. Communications of the ACM, November1997, volume 40, No. 11, pp. 19–24.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Sabrina Sowers
    • 1
  • Abdou Youssef
    • 1
  1. 1.Department of Electrical Engineering and Computer ScienceThe George Washington UniversityWashington, DCUSA

Personalised recommendations