[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Robust Watermarking for Images Based on Color Manipulation

  • Conference paper
Information Hiding (IH 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1768))

Included in the following conference series:

Abstract

In this paper we present a new efficient watermarking scheme for images. The basic idea of our method is to alter the colors of the given image in a suitable but imperceptible way. This is accomplished by moving the coordinates of each color in the color opponency space. The scheme is shown to be robust against a large class of image manipulations. The robustness of the scheme is also theoretically analyzed and it is shown to depend on the number of colors in the image being marked.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Acken, J.M.: Low Watermarking Adds Value to Digital Content. Communications of the ACM 41(7), 75–77 (1998)

    Article  Google Scholar 

  2. Bell, A.E., Braudaway, G.W., Mintzer, F.: Opportunities for Watermarking Standards. Communications of the ACM 41(7), 57–64 (1998)

    Article  Google Scholar 

  3. Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. In: Proc. of SPIE,  Vol. 2420, p. 40 (1995)

    Google Scholar 

  4. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)

    Google Scholar 

  5. Brassil, J., Low, S., Maxemchuk, N., O’Gorman, L.: Electronic marking and identification techniques to discourage document copying. In: Proc. of Infocom 1994, pp. 1278–1287 (1994)

    Google Scholar 

  6. Ballard, D.H., Brown, C.M.: Computer Vision. Prenctice Hall, Inc., Englewood Cliffs (1982)

    Google Scholar 

  7. Caronni, G.: Assuring ownership rights for digital images. In: Proc. of reliable IT Systems, VIS 1995. Vieweg Publishing Company (1995)

    Google Scholar 

  8. Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. IEEE Transaction on Image Processing 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  9. Craver, S., Yeo, B.-L., Yeung, M.: Technical Trials and Legal Tribulations. Communications of the ACM 41(7), 45–56 (1998)

    Article  Google Scholar 

  10. Ergun, F., Kilian, J., Kumar, S.R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)

    Google Scholar 

  11. Fleck, M.M., Forsyth, D.A., Bregler, C.: Finding Naked People, Lectures in Computer Science (1996)

    Google Scholar 

  12. Foley, J.D., Dam, A.V., Feiner, S.K., Hughes, J.F.: Computer Graphics, Principles and Practice. Addison Wesley, Reading (1990)

    Google Scholar 

  13. Glassner, A.S.: Principle of Digital Images. Morgan Kaufmann Publishers Inc, San Francisco (1995)

    Google Scholar 

  14. Goldreich, O.: Foundations of Cryptography (Fragments of a Book), Available online from http://theory.lcs.mit.edu/~oded/frag.html

  15. Koch, E., Rindfrey, J., Zhao, J.: Copyright protection for multimedia data. In: Proc. of the Int. Conf. on Digital Media and Electronic Publishing (1994)

    Google Scholar 

  16. Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Delp, E., et al. (eds.) proceedings of Electronic Imaging 1999, Security and Watermarking of Multimedia Contents, San José, CA USA, vol. 3657 (1999)

    Google Scholar 

  17. Luo, C., Koch, E., Zhao, J.: Business Today and Tomorrow. Communications of the ACM 41(7), 67–72 (1998)

    Article  Google Scholar 

  18. Macq, B.M., Quisquater, J.J.: Cryptology for digital TV broadcasting. Proc. of IEEE  83(6), 944–957 (1995)

    Google Scholar 

  19. Matsui, K., Tanaka, K.: Video-steganography. In: IMA Intellectual Property Project Proceedings, vol. 1, pp. 187–206 (1994)

    Google Scholar 

  20. Memon, N., Wah, P.: Wong Protecting Digital Media Content. Communications of the ACM 41(7), 35–43 (1998)

    Article  Google Scholar 

  21. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography.

    Google Scholar 

  22. Netravali, A.N., Haskell, B.G.: Digital Pictures:Representation and compression. In: Application of Communication Theory. Plenum Press, NY (1988)

    Google Scholar 

  23. Podilchuk, C.I., Zeng, W.: Image Adaptive Watermarking Algorithm Based on a Human Visual model. Signal Processing 66(3), 337–355 (1998)

    Article  Google Scholar 

  24. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  25. Pitas, I., Voyatzis, G.: Protecting Digital-Image Copyrights: A Framework. IEEE Computer Graphics and Applications 19(1), 18–24 (1999)

    Article  Google Scholar 

  26. Van Schyndel, R., Tirkel, A., Osborne, C.: A Digital watermark. In: Proceedings of ICIP, pp. 86–90. IEEE Press, Los Alamitos (1994)

    Google Scholar 

  27. Tanaka, K., Nakamura, Y., Matsui, K.: Embedding secret information into a dithered multi-level image. In: Proc. 1990 IEEE Military Communications Conference, pp. 216–220 (1990)

    Google Scholar 

  28. Yeung, M.: Digital Watermarking. Comm. of the ACM 41(7), 31–33 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Battiato, S., Catalano, D., Gallo, G., Gennaro, R. (2000). Robust Watermarking for Images Based on Color Manipulation. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_21

Download citation

  • DOI: https://doi.org/10.1007/10719724_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67182-4

  • Online ISBN: 978-3-540-46514-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics