Skip to main content

Testing Digital Watermark Resistance to Destruction

  • Conference paper
  • First Online:
Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

Digital watermarking is the steganographic technique used to discourage the unauthorized distribution of digital media such as text, audio, still images, and video. Artists, publishers and any other individual or business that has a commercial interest in preventing illegal copies of their work are in need of a way to achieve this. There are commercial techniques available on the Internet (like Steganos) and other techniques that are being researched. A desirable watermark is undetectable and can always be recovered. The ability to be recoverable is of concern, since if the watermark is easily destroyed it is useless. This paper investigates three known steganographic algorithms with respect to their robustness against four image processing operations: filtering, bitplane removal, DCT compression, and quantization. It is found that those steganographic algorithms often fail to recover the watermarks after the four image processing operations are performed.

David Balenson is also acknowledged for his support of this work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Raymond B. Wolfgang and Edward J. Delp. “Overview of image security techniques with applications in multimedia systems”. http://www.dynamo.ecn.purdue.edu/~ace/water/digwmk.html

  2. R. G. van Schyndel, A. Z. Tirkel, C. F. Osborne. “A Digital Watermark”, Proceedings of the International Conference on Image Processing, November, 1994, Austin, Texas, vol. 2, pp. 86–90.

    Google Scholar 

  3. Ross Anderson and Fabien Petitcolas. “On the Limits of Steganography”. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright & Privacy Protection, vol. 16 no. 4, pp 474–481, May 1998. http://www.cl.cam.ac.uk/~fapp2/papers/jsac98-limsteg/

    Article  Google Scholar 

  4. Walter Bender, Daniel Gruhl and Norishige Morimoto. “Techniques for Data Hiding”. Proceedings of the SPIE, volume 2420, February 1995, p. 40.

    Google Scholar 

  5. E. Koch and Z. Zhao. “Towards Robust and Hidden Image Copyright Labeling”. Proceedings of the 1995 IEEE Workshop on Non-Linear Signal and Image Processing, June 1995.

    Google Scholar 

  6. I. Pitas. “A Method for Signature Casting on Digital Images”. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 215–218.

    Google Scholar 

  7. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. “Secure Spread Spectrum Watermarking for Images, Audio, and Video”. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 243–246.

    Google Scholar 

  8. J. J. K. ó. Ruanaidh, W. J. Dowling, and F. M. Boland. “Phase Watermarking of Digital Images”. 1996 IEEE Proceedings of the International Conferences on Image Processing, pp. 239–242.

    Google Scholar 

  9. Christine Podilchuk and Wenjun Zeng. “Perceptual Watermarking of Still Images”. Proceedings of the IEEE MMSP Workshop, Princeton, June 1997, pp. 363–368.

    Google Scholar 

  10. Christine Podilchuk and Wenjun Zeng. “Watermarking of the JPEG Bitstream”. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST’ 97 International Conference, pp. 253–260.

    Google Scholar 

  11. Raymond B. Wolfgang and Edward J. Delp. “A Watermarking Technique for Digital Imagery: Further Studies”. Proceedings of the International Conference on Imaging Science, System, and Technology. CISST’ 97 International Conference, pp. 279–284.

    Google Scholar 

  12. Tsung-Li Wu and S. Felix Wu. “Selective Encryption and Watermarking of MPEG Video”. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST’ 97 International Conference, pp. 261–269.

    Google Scholar 

  13. Dave Benham, Nasir Memon, et. al. “Fast Watermarking of DCT-based Compressed Images”. Proceedings of the International Conference on Imaging Science, Systems, and Technology. CISST’ 97 International Conference, pp. 243–252.

    Google Scholar 

  14. R. Wolfgang and E. Delp. “A Watermark for Digital Images”. Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16–19, 1996, volume 3, pp. 219–222.

    Google Scholar 

  15. Birgit Pfitzmann. “Information Hiding Terminology”. Proceedings of Information Hiding. Springer Lecture Notes in Computer Science, volume 1174 (1996), pp. 347–350.

    Chapter  Google Scholar 

  16. Ross Anderson. “Stretching the Limits of Steganography”. In Proceedings of the First Workshop on Information Hiding, 1996, pp. 39–48 http://www.cl.cam.ac.uk/ftp/users/rja14/stegan.ps.gz

  17. M. Yeung and F. C. Mintzer. “Digital Watermarking for High Quality Images”. 1997 IEEE Proceedings of the International Conferences on Image Processing, pp. 357–362.

    Google Scholar 

  18. J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman. “Electronic Marking and Identification Techniques to Discourage Document Copying”. Proceedings of Infocom’ 94, pp. 1278–1287, 1994.

    Google Scholar 

  19. Richard Wiggins. “Stop Those Copyright Claim Jumpers!: Corralling Your Content”. NewMedia, http://www.newmedia.com, pp. 40–44, October 13, 1997.

  20. R. Gonzalez and R. Woods. Digital Image Processing. Second Edition. Addison-Wesley Publishing, 1993.

    Google Scholar 

  21. Peter Wayner. Digital Copyright Protection. AP Professional, Chestnut Hill, Massachusetts, 1997.

    Google Scholar 

  22. M. Swanson, B. Zhu and A. Tewfik. “Transparent Robust Image Watermarking”. Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16–19, 1996, volume 3, pp. 211–214.

    Google Scholar 

  23. Khalid Sayood. Introduction to Data Compression. Morgan Kaufman Publishers, Inc., San Francisco, California, 1996.

    MATH  Google Scholar 

  24. Majid Rabbani and Paul W. Jones. Digital Image Compression Techniques. SPIE Optical Engineering Press, Bellingham Washington, 1991.

    Book  Google Scholar 

  25. Hal Berghel. “Watermarking Cyberspace”. Communications of the ACM, November1997, volume 40, No. 11, pp. 19–24.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sowers, S., Youssef, A. (1998). Testing Digital Watermark Resistance to Destruction. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics