Skip to main content

A Quick Tour of Watermarking Techniques

  • Chapter
  • First Online:
Watermarking Security

Abstract

In order to understand and analyse the main components of watermarking security presented in the next chapters, we introduce in this chapter the different elements needed to embed a watermark or a message inside a host content. We first present a functional view of a watermarking scheme (the embedding function, the decoding/detection function) and then its geometrical interpretation. Then we present the most popular class of watermarking schemes: spread-spectrum watermarking and watermarking techniques based on the idea of dirty paper codes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kalke T (2001) Considerations on watermarking security. In: Proceedings of the of MMSP. Cannes, France, October pp 201–206

    Google Scholar 

  2. Hartung F, Su JK, Girod B (1999) Spread spectrum watermarking: malicious attacks and counter-attacks. In: San Jose CA, January S (eds) Proceedings of SPIE: Security and watermarking of multimedia contents Bd. 3657. pp 147–158

    Google Scholar 

  3. Florencio M (2003) Improved spread spectrum: a new modulation technique for robust watermarking. In: IEEE Transactions on Signal Processing 51

    Google Scholar 

  4. Furon T, Jégourel C, Guyader A, Cérou F (2009) Estimating the probability fo false alarm for a zero-bit watermarking technique. In: Digital Signal Processing, 2009 16th International Conference on IEEE, pp 1–8

    Google Scholar 

  5. Miller ML, Cox IJ, Bloom JA (2000) Informed embedding: exploiting image and detector information during watermark insertion. In: Image Processing, 2000. Proceedings. 2000 International Conference on Bd. 3 IEEE, p 1–4

    Google Scholar 

  6. Furon T, Bas P (2008) Broken arrows. EURASIP J Inf Secur 1–13:1687–4161

    Google Scholar 

  7. Costa M (1983) Writing on dirty paper. In: IEEE Trans. on Inf Theor. 29:439–441

    Google Scholar 

  8. Miller ML, Doërr GJ, Cox IJ (2004) Applying informed coding and embedding to design a robust, high capacity watermark. In: IEEE Trans. on Imag Process. 6:791–807

    Google Scholar 

  9. Chen B, Wornell GW (2001) Quantization index modulation : a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theor 47(4):1423–1443

    Article  MathSciNet  MATH  Google Scholar 

  10. Eggers JJ, Buml R, Tzschoppe R, Girod B (2003) Scalar Costa Scheme for Information Embedding. In: IEEE Trans Signal Process. 51: 1003–1019

    Google Scholar 

  11. Moulin P, Koetter R (2005) Data hiding codes. In: Proceedings of IEEE 93, December 12 pp 2083–2126

    Google Scholar 

  12. Conway JH, Sloane NJA (1998) Sphere packings, lattices and groups. Springer, New York

    MATH  Google Scholar 

  13. Erez U, Litsyn S, Zamir R (2005) Lattices which are good for (almost) everything. IEEE Trans Inf Theor 51:3401–3416

    Google Scholar 

  14. Pérez-Freire L, Pérez-González F (2008) Security of lattice-based data hiding against the watermarked only attack. In: IEEE Trans Inf Forensics Secur 3, 4:593–610. http://dx.doi.org/10.1109/TIFS.2008.2002938. doi:10.1109/TIFS.2008.2002938. ISSN 1556–6013

    Google Scholar 

  15. Andrew JV (1995) CDMA: Principles of Spread Spectrum Communication. Addison-Wesley, Boston ISBN 0–201–63374–4

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick Bas .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Bas, P., Furon, T., Cayre, F., Doërr, G., Mathon, B. (2016). A Quick Tour of Watermarking Techniques. In: Watermarking Security. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-0506-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0506-0_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0505-3

  • Online ISBN: 978-981-10-0506-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics