Abstract
In order to understand and analyse the main components of watermarking security presented in the next chapters, we introduce in this chapter the different elements needed to embed a watermark or a message inside a host content. We first present a functional view of a watermarking scheme (the embedding function, the decoding/detection function) and then its geometrical interpretation. Then we present the most popular class of watermarking schemes: spread-spectrum watermarking and watermarking techniques based on the idea of dirty paper codes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kalke T (2001) Considerations on watermarking security. In: Proceedings of the of MMSP. Cannes, France, October pp 201–206
Hartung F, Su JK, Girod B (1999) Spread spectrum watermarking: malicious attacks and counter-attacks. In: San Jose CA, January S (eds) Proceedings of SPIE: Security and watermarking of multimedia contents Bd. 3657. pp 147–158
Florencio M (2003) Improved spread spectrum: a new modulation technique for robust watermarking. In: IEEE Transactions on Signal Processing 51
Furon T, Jégourel C, Guyader A, Cérou F (2009) Estimating the probability fo false alarm for a zero-bit watermarking technique. In: Digital Signal Processing, 2009 16th International Conference on IEEE, pp 1–8
Miller ML, Cox IJ, Bloom JA (2000) Informed embedding: exploiting image and detector information during watermark insertion. In: Image Processing, 2000. Proceedings. 2000 International Conference on Bd. 3 IEEE, p 1–4
Furon T, Bas P (2008) Broken arrows. EURASIP J Inf Secur 1–13:1687–4161
Costa M (1983) Writing on dirty paper. In: IEEE Trans. on Inf Theor. 29:439–441
Miller ML, Doërr GJ, Cox IJ (2004) Applying informed coding and embedding to design a robust, high capacity watermark. In: IEEE Trans. on Imag Process. 6:791–807
Chen B, Wornell GW (2001) Quantization index modulation : a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theor 47(4):1423–1443
Eggers JJ, Buml R, Tzschoppe R, Girod B (2003) Scalar Costa Scheme for Information Embedding. In: IEEE Trans Signal Process. 51: 1003–1019
Moulin P, Koetter R (2005) Data hiding codes. In: Proceedings of IEEE 93, December 12 pp 2083–2126
Conway JH, Sloane NJA (1998) Sphere packings, lattices and groups. Springer, New York
Erez U, Litsyn S, Zamir R (2005) Lattices which are good for (almost) everything. IEEE Trans Inf Theor 51:3401–3416
Pérez-Freire L, Pérez-González F (2008) Security of lattice-based data hiding against the watermarked only attack. In: IEEE Trans Inf Forensics Secur 3, 4:593–610. http://dx.doi.org/10.1109/TIFS.2008.2002938. doi:10.1109/TIFS.2008.2002938. ISSN 1556–6013
Andrew JV (1995) CDMA: Principles of Spread Spectrum Communication. Addison-Wesley, Boston ISBN 0–201–63374–4
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 The Author(s)
About this chapter
Cite this chapter
Bas, P., Furon, T., Cayre, F., Doërr, G., Mathon, B. (2016). A Quick Tour of Watermarking Techniques. In: Watermarking Security. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-0506-0_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-0506-0_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0505-3
Online ISBN: 978-981-10-0506-0
eBook Packages: EngineeringEngineering (R0)