Towards the Public but Noninvertible Watermarking

  • Xianfeng Zhao
  • Yingxia Dai
  • Dengguo Feng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)


The public watermarking schemes, which do not need the originals in ownership verification, have been proved invertible in nature. However, this paper is to demonstrate that some public but noninvertible schemes exist in the cases of the ill-posed linear embedding or nonlinear embedding. Since attackers have to solve an ill-posed linear or nonlinear system, they have great difficulty dividing a released version into their claimed original data and scaled watermarks, and in the meantime making the latter be the particular adaptive results based on the former. Since the inverted solutions are drastically perturbed and perceptually unacceptable, they can fail to cheat the private schemes. Furthermore, because the owner has the embedded watermark which jointly defines the embedding system, he or she can do the reverse engineering more precisely and ultimately differentiate himself or herself from the attackers in a public scheme, achieving the public but noninvertible schemes.


Reverse Engineering Image Watermark Watermark Scheme Linear Feedback Shift Register Embed Watermark 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data, a state-of-the-art overview. IEEE Signal Processing Magazine 17(5), 20–46 (2000)CrossRefGoogle Scholar
  2. 2.
    Cox, I.J., Linnartz, J.M.G.: Some general methods for tempering with watermarks. IEEE Journal on Selected Areas in Communications 6(4), 587–593 (1998)CrossRefGoogle Scholar
  3. 3.
    Kutter, M., Petitcolas, F.: A fair benchmark for image watermarking systems. In: SPIE Proc. of Security and Watermarking of Multimedia Contents, April 1999, vol. 3657, pp. 226–239 (1999)Google Scholar
  4. 4.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  5. 5.
    Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: On the invertibility of invisible watermarking techniques. In: Proc. of 1997 International Conference on Image Processing of IEEE Signal Processing Society, October 1997, vol. 3, pp. 540–543 (1997)Google Scholar
  6. 6.
    Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16(4), 573–586 (1998)CrossRefGoogle Scholar
  7. 7.
    Qiao, L., Nahrstedt, K.: Watermarking methods for MPEG encoded video: Towards resolving rightful ownership. In: Proc. of IEEE International Conference on Multimedia Computing and Systems, June 1998, pp. 276–285 (1998)Google Scholar
  8. 8.
    Adelsbach, A., Katzenbeisser, S., Sadeghi, A.: On the insecurity of non-invertible watermarking schemes for dispute resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 355–369. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Cox, I.J., Miller, M.I.: A review of watermarking and the importance of perceptual modeling. In: SPIE Proc. of Human Vision and Elec. Imaging, February 1997, vol. 3016, pp. 92–99 (1997)Google Scholar
  10. 10.
    Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L.: Robust audio watermarking using perceptual masking. Signal Processing 66, 337–355 (1998)CrossRefzbMATHGoogle Scholar
  11. 11.
    Kirsch, A.: An Introduction to the Mathematical Theory of Inverse Problems. Springer, Berlin (1996)CrossRefzbMATHGoogle Scholar
  12. 12.
    Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proc. of IEEE International Conference on Image Processing (ICIP 1996), Septemper 1996, vol. 3, pp. 243–246 (1996)Google Scholar
  13. 13.
    Castleman, K.R.: Digital Image Processing, 2nd edn. Prentice Hall Inc., Englewood Cliffs (1997)Google Scholar
  14. 14.
    Lancaster, P., Tismenetsky, M.: The Theory of Matrix, 2nd edn. Academic Press, Orlando (1985)zbMATHGoogle Scholar
  15. 15.
    Barni, M., Bartolini, F., Capellini, V., Piva, A.: A DCT-domain system for robust image watermarking. Signal Processing 66, 357–372 (1998)CrossRefzbMATHGoogle Scholar
  16. 16.
    Burden, R.L., Faires, J.D.: Numerical Analysis, 7th edn. Thomson Learning Inc., Stamford (2001)zbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Xianfeng Zhao
    • 1
  • Yingxia Dai
    • 1
  • Dengguo Feng
    • 1
  1. 1.The State Key Laboratory of Information SecurityGraduate School of Chinese Academy of SciencesBeijingP. R. China

Personalised recommendations