Skip to main content

Holographic Image Watermarking for Secure Content

  • Conference paper
Book cover Trust and Privacy in Digital Business (TrustBus 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3184))

Abstract

We propose a new watermarking scheme that can be used to embed multiple bits and also resilient to geometrical transforms such as scaling, rotation, and cropping, based on off-axis holographic watermark that allows multiple watermark recovery without original content(cover image). The holographic watermark is that Fourier transformed digital hologram is embedded into cover image in the spatial domain. The proposed method has not only increased robustness with a stronger embedding but also imperceptibility of the watermark in the evaluation process. To compare with the conventional scheme, the spread spectrum, we embedded and recovered maximum 1,024 bits that consist of binary number over PSNR(peak signal-to-noise ratio) 39dB. And also, we computed robustness with BER(bit-error rate) corresponding the above attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, J.I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. NEC Res. Insti., Princeton, NJ, Tech. Rep. 95-100 (1995)

    Google Scholar 

  2. Pitas, I., Kaskalis, T.: Applying Signatures on Digital Image. In: Workshop on Nonlinear Signal and Image Processing, June 1995, pp. 460–463 (1995)

    Google Scholar 

  3. Kim, K.T., Kim, J.H., Kim, E.S.: Multiple Information Hiding Technique using Random Sequence and Hadamard Matrix. Opt. Eng 40(11), 2489–2494 (2001)

    Article  Google Scholar 

  4. O’Rauanidh, J.J.K., Pun, T.: Rotation, Scale and Translation Invariant Digital Image Watermarking. Signal processing journal (1998)

    Google Scholar 

  5. Lin, C.Y.: Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process. In: ACM Multimedia 1999, Orlando, FL, USA (October 1999)

    Google Scholar 

  6. Lin, C.Y., Chang, S.-F.: Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process. In: ISMIP 1999, Taipei, Taiwan (December 1999)

    Google Scholar 

  7. Caldelli, R., Barni, M., Bartolini, F., Piva, A.: Geo-metric-Invariant Robust Watermarking through Constellation Matching in the Frequency domain. In: Proceedings of 7th IEEE ICIP 2000, Vancouver, Canada, September 2000, vol. II, pp. 65–68 (2000)

    Google Scholar 

  8. Choi, C.R., Jeong, J.: Robust Image Watermarking Scheme Resilient to De-synchronization Attacks. In: SPIE 2002 Security and Watermarking of Multimedia Contents IV, San Jose, USA (January 2002)

    Google Scholar 

  9. Gabor, D.: A New Microscope Principle. Nature 161, 777 (1948)

    Article  Google Scholar 

  10. Leith, E.N., Upatnieks, J.: Reconstructed Wavefronts and Communication Theory. J. Opt. Soc. Am. 52, 1377 (1962)

    Article  Google Scholar 

  11. Hartung, F., Su, J.K., Girod, B.: Spread Spectrum Watermarking: Malicious Attacks and Counterattacks. In: Proceedings of SPIE 3657, Security and Watermarking of Multimedia Cotents, pp. 147–158 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, K., Kim, J., Lee, J., Choi, J. (2004). Holographic Image Watermarking for Secure Content. In: Katsikas, S., Lopez, J., Pernul, G. (eds) Trust and Privacy in Digital Business. TrustBus 2004. Lecture Notes in Computer Science, vol 3184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30079-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30079-3_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22919-3

  • Online ISBN: 978-3-540-30079-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics