[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1232454.1232467acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Towards robust hidden watermarking using multiple quasi-circles

Published: 05 October 2001 Publication History

Abstract

Digital watermarking is the process of embedding a pattern or an icon into an image to establish legal ownership to protect the copyrights of the image in a publicly accessible image database. In this paper, we propose three robust watermarking schemes. One of our schemes, Diagonal Insersion (DI), modifies the Fourier coefficients of the middle frequencies of the input image, according to a binary string. Another scheme, Randomized Multiple Circles (RMC), is based on a technique proposed by Licks [8] which embeds a binary string by modifying the Fourier coefficients along concentric circles. We introduce a random perturbation into the radius of the circles to protect the waterwark from removal (cryptographic attack). A hybrid technique (HY) is also proposed to combine DI and RMC. These methods are robust against various attacks, such as geometric transformation, filtering, cropping and histogram equalization. Some experiemental results are also reported.

References

[1]
A. M. Alattar. Smart images using digimarc s watermarking technology. In IS&T/SPIE's 12'th International Symposium on Electrical Imaging, San Jose, CA, volume 3971, number 25, 2000.
[2]
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute, 1995.
[3]
V. Darmstaedter, J. F. Delaigle, J. J. Quisquater, and B. Macq. Low cost spatial watermarking. Computers and Graphics, 22(4):417--424, 1998.
[4]
C. T. Hsu and J. L. Wu. Hidden digital watermarks in images. IEEE Trans. on Image Processing, 8(1):58--68, 1999.
[5]
E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Proc of the IEEE Workshop on Nonlinear Signal and Image Processing, pages 452--455, 1995.
[6]
D. Kundur and D. Hatzinakos. A robust digital image watermarking scheme using wavelet-based fusion. In Proc. of the IEEE Intl. Conf. On Image Processing, Vol. 1, pages 544--547, 1997.
[7]
C. H. Lee and Y. K. Lee. An adaptive digital image watermarking technique for copyright protection. IEEE Trans. on Consumer Electronics, 45(4):1005--1015, 1999.
[8]
V. Licks and R. Jordan. On digital image watermarking robust to geometric transformations. In Proc. of the Intl. Conf. on Image Processing, Vol. 3, pages 690--693, 2000.
[9]
J. K. O'Ruanaidh and T. Pun. Rotation, scale and translation invariant digital image watermarking. In Proc. of the Intl. Conf. on Image Processing, Vol. 1, pages 536--539, 1997.
[10]
S. Pereira, J. O. Ruanaidh, F. Deguillaume, G. Csurka, and T. Pun. Template based recovery of fourier-based watermarks using log-polar and log-log maps. In Proc. of the IEEE Intl. Conf. on Multimedia Computing and Systems, Vol. 1, pages 870--874, 1999.
[11]
A. Piva, M. Barni, F. Bartolini, and V. Cappellini. A watermarking technique for the protection of digital images ipr. In J.-Y. Roger et al., editor, Advances in Information Technologies: The Business Challenge, pages 636--643. IOS Press, 1998.
[12]
B. Schneier. Applied Cryptography. John Wiley & Sons, 1996.

Cited By

View all
  • (2009)Swarm intelligence approach of leaker identification in secure multicast2009 World Congress on Nature & Biologically Inspired Computing (NaBIC)10.1109/NABIC.2009.5393452(660-665)Online publication date: Dec-2009
  • (2002)A secure multicast protocol with copyright protectionACM SIGCOMM Computer Communication Review10.1145/568567.56857032:2(42-60)Online publication date: 1-Apr-2002

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '01: Proceedings of the 2001 workshop on Multimedia and security: new challenges
October 2001
80 pages
ISBN:1581133936
DOI:10.1145/1232454
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 October 2001

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2009)Swarm intelligence approach of leaker identification in secure multicast2009 World Congress on Nature & Biologically Inspired Computing (NaBIC)10.1109/NABIC.2009.5393452(660-665)Online publication date: Dec-2009
  • (2002)A secure multicast protocol with copyright protectionACM SIGCOMM Computer Communication Review10.1145/568567.56857032:2(42-60)Online publication date: 1-Apr-2002

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media