Abstract
In this paper we present a new efficient watermarking scheme for images. The basic idea of our method is to alter the colors of the given image in a suitable but imperceptible way. This is accomplished by moving the coordinates of each color in the color opponency space. The scheme is shown to be robust against a large class of image manipulations. The robustness of the scheme is also theoretically analyzed and it is shown to depend on the number of colors in the image being marked.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Acken, J.M.: Low Watermarking Adds Value to Digital Content. Communications of the ACM 41(7), 75–77 (1998)
Bell, A.E., Braudaway, G.W., Mintzer, F.: Opportunities for Watermarking Standards. Communications of the ACM 41(7), 57–64 (1998)
Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. In: Proc. of SPIE, Vol. 2420, p. 40 (1995)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Brassil, J., Low, S., Maxemchuk, N., O’Gorman, L.: Electronic marking and identification techniques to discourage document copying. In: Proc. of Infocom 1994, pp. 1278–1287 (1994)
Ballard, D.H., Brown, C.M.: Computer Vision. Prenctice Hall, Inc., Englewood Cliffs (1982)
Caronni, G.: Assuring ownership rights for digital images. In: Proc. of reliable IT Systems, VIS 1995. Vieweg Publishing Company (1995)
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. IEEE Transaction on Image Processing 6(12), 1673–1687 (1997)
Craver, S., Yeo, B.-L., Yeung, M.: Technical Trials and Legal Tribulations. Communications of the ACM 41(7), 45–56 (1998)
Ergun, F., Kilian, J., Kumar, S.R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)
Fleck, M.M., Forsyth, D.A., Bregler, C.: Finding Naked People, Lectures in Computer Science (1996)
Foley, J.D., Dam, A.V., Feiner, S.K., Hughes, J.F.: Computer Graphics, Principles and Practice. Addison Wesley, Reading (1990)
Glassner, A.S.: Principle of Digital Images. Morgan Kaufmann Publishers Inc, San Francisco (1995)
Goldreich, O.: Foundations of Cryptography (Fragments of a Book), Available online from http://theory.lcs.mit.edu/~oded/frag.html
Koch, E., Rindfrey, J., Zhao, J.: Copyright protection for multimedia data. In: Proc. of the Int. Conf. on Digital Media and Electronic Publishing (1994)
Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Delp, E., et al. (eds.) proceedings of Electronic Imaging 1999, Security and Watermarking of Multimedia Contents, San José, CA USA, vol. 3657 (1999)
Luo, C., Koch, E., Zhao, J.: Business Today and Tomorrow. Communications of the ACM 41(7), 67–72 (1998)
Macq, B.M., Quisquater, J.J.: Cryptology for digital TV broadcasting. Proc. of IEEE 83(6), 944–957 (1995)
Matsui, K., Tanaka, K.: Video-steganography. In: IMA Intellectual Property Project Proceedings, vol. 1, pp. 187–206 (1994)
Memon, N., Wah, P.: Wong Protecting Digital Media Content. Communications of the ACM 41(7), 35–43 (1998)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography.
Netravali, A.N., Haskell, B.G.: Digital Pictures:Representation and compression. In: Application of Communication Theory. Plenum Press, NY (1988)
Podilchuk, C.I., Zeng, W.: Image Adaptive Watermarking Algorithm Based on a Human Visual model. Signal Processing 66(3), 337–355 (1998)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998)
Pitas, I., Voyatzis, G.: Protecting Digital-Image Copyrights: A Framework. IEEE Computer Graphics and Applications 19(1), 18–24 (1999)
Van Schyndel, R., Tirkel, A., Osborne, C.: A Digital watermark. In: Proceedings of ICIP, pp. 86–90. IEEE Press, Los Alamitos (1994)
Tanaka, K., Nakamura, Y., Matsui, K.: Embedding secret information into a dithered multi-level image. In: Proc. 1990 IEEE Military Communications Conference, pp. 216–220 (1990)
Yeung, M.: Digital Watermarking. Comm. of the ACM 41(7), 31–33 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Battiato, S., Catalano, D., Gallo, G., Gennaro, R. (2000). Robust Watermarking for Images Based on Color Manipulation. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_21
Download citation
DOI: https://doi.org/10.1007/10719724_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67182-4
Online ISBN: 978-3-540-46514-0
eBook Packages: Springer Book Archive