Abstract
Digital watermarking is the steganographic technique used to discourage the unauthorized distribution of digital media such as text, audio, still images, and video. Artists, publishers and any other individual or business that has a commercial interest in preventing illegal copies of their work are in need of a way to achieve this. There are commercial techniques available on the Internet (like Steganos) and other techniques that are being researched. A desirable watermark is undetectable and can always be recovered. The ability to be recoverable is of concern, since if the watermark is easily destroyed it is useless. This paper investigates three known steganographic algorithms with respect to their robustness against four image processing operations: filtering, bitplane removal, DCT compression, and quantization. It is found that those steganographic algorithms often fail to recover the watermarks after the four image processing operations are performed.
David Balenson is also acknowledged for his support of this work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Raymond B. Wolfgang and Edward J. Delp. “Overview of image security techniques with applications in multimedia systems”. http://www.dynamo.ecn.purdue.edu/~ace/water/digwmk.html
R. G. van Schyndel, A. Z. Tirkel, C. F. Osborne. “A Digital Watermark”, Proceedings of the International Conference on Image Processing, November, 1994, Austin, Texas, vol. 2, pp. 86–90.
Ross Anderson and Fabien Petitcolas. “On the Limits of Steganography”. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright & Privacy Protection, vol. 16 no. 4, pp 474–481, May 1998. http://www.cl.cam.ac.uk/~fapp2/papers/jsac98-limsteg/
Walter Bender, Daniel Gruhl and Norishige Morimoto. “Techniques for Data Hiding”. Proceedings of the SPIE, volume 2420, February 1995, p. 40.
E. Koch and Z. Zhao. “Towards Robust and Hidden Image Copyright Labeling”. Proceedings of the 1995 IEEE Workshop on Non-Linear Signal and Image Processing, June 1995.
I. Pitas. “A Method for Signature Casting on Digital Images”. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 215–218.
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. “Secure Spread Spectrum Watermarking for Images, Audio, and Video”. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 243–246.
J. J. K. ó. Ruanaidh, W. J. Dowling, and F. M. Boland. “Phase Watermarking of Digital Images”. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 239–242.
Christine Podilchuk and Wenjun Zeng. “Perceptual Watermarking of Still Images”. Proceedings of the IEEE MMSP Workshop, Princeton, June 1997, pp. 363–368.
Christine Podilchuk and Wenjun Zeng. “Watermarking of the JPEG Bitstream”. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST’ 97 International Conference, pp. 253–260.
Raymond B. Wolfgang and Edward J. Delp. “A Watermarking Technique for Digital Imagery: Further Studies”. Proceedings of the International Conference on Imaging Science, System, and Technology. CISST’ 97 International Conference, pp. 279–284.
Tsung-Li Wu and S. Felix Wu. “Selective Encryption and Watermarking of MPEG Video”. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST’ 97 International Conference, pp. 261–269.
Dave Benham, Nasir Memon, et. al. “Fast Watermarking of DCT-based Compressed Images”. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST’ 97 International Conference, pp. 243–252.
R. Wolfgang and E. Delp. “A Watermark for Digital Images”. Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16–19, 1996, volume 3, pp. 219–222.
Birgit Pfitzmann. “Information Hiding Terminology”. Proceedings of Information Hiding. Springer Lecture Notes in Computer Science, volume 1174 (1996), pp. 347–350.
Ross Anderson. “Stretching the Limits of Steganography”. In Proceedings of the First Workshop on Information Hiding, 1996, pp. 39–48 http://www.cl.cam.ac.uk/ftp/users/rja14/stegan.ps.gz
M. Yeung and F. C. Mintzer. “Digital Watermarking for High Quality Images”. 1997 IEEE Proceedings of the International Conferences on Image Processing, pp. 357–362.
J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman. “Electronic Marking and Identification Techniques to Discourage Document Copying”. Proceedings of Infocom’ 94, pp. 1278–1287, 1994.
Richard Wiggins. “Stop Those Copyright Claim Jumpers!: Corralling Your Content”. NewMedia, http://www.newmedia.com, pp. 40–44, October 13, 1997.
R. Gonzalez and R. Woods. Digital Image Processing. Second Edition. Addison-Wesley Publishing, 1993.
Peter Wayner. Digital Copyright Protection. AP Professional, Chestnut Hill, Massachusetts, 1997.
M. Swanson, B. Zhu and A. Tewfik. “Transparent Robust Image Watermarking”. Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16–19, 1996, volume 3, pp. 211–214.
Khalid Sayood. Introduction to Data Compression. Morgan Kaufman Publishers, Inc., San Francisco, California, 1996.
Majid Rabbani and Paul W. Jones. Digital Image Compression Techniques. SPIE Optical Engineering Press, Bellingham Washington, 1991.
Hal Berghel. “Watermarking Cyberspace”. Communications of the ACM, November1997, volume 40, No. 11, pp. 19–24.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sowers, S., Youssef, A. (1998). Testing Digital Watermark Resistance to Destruction. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_17
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_17
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive