Abstract
Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermarking landscape. The three main technical challenges faced by watermarking algorithms are fidelity, robustness and security. Current watermarking methods offer possibly acceptable fidelity and robustness against certain types of processing, such as data compression and noise addition, but are not sufficiently robust against geometric transforms such as scaling and cropping of images. Theoretical approaches have been developed that could lead to secure watermarking methods, but substantial gaps remain between theory and practice.
Preview
Unable to display preview. Download preview PDF.
References
R. Anderson, Ed., Information Hiding, First International Workshop Proceedings, Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin, 1996.
W. Bender, D. Gruhl, N. Marimoto, and A. La, “Techniques for data hiding,” IBM Systems Journal 35 (1996).
G.R. Blakely, C. Meadors, and G.B. Purdy, “Fingerprinting long unforgiving messages,” Crypto '85, Lecture Notes in Computer Science 218, Springer-Verlag, Berlin (1985), pp.180–189.
D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” Crypto '95, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995, pp. 452–465.
R.D. Brandt and F. Lin, “Representations that uniquely characterize images modulo translation, rotation, and scaling,” Pattern Recognition Letters 17 (1996), pp. 1001–1015.
G. W. Braudaway, “Protecting publicly-available images with an invisible image watermark,” Proc. IEEE Int. Conf. on Image Procesing, ICIP-97 (1997), Vol. I, pp. 524–51.
B. Chor, A. Fiat, and M. Naor, “Tracing traitors,” Crypto '94, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995, pp. 452–465.
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing 6 (1997), 1673–1687.
I. Cox and J.-P. Linnartz, “Public watermarks and resistance to tampering,” Proc. IEEE Conf. on Image Processing (1997), CD-ROM.
S. Craver, N. Memon, B.L. Yeo, and M. Yeung, “Can invisible watermarks resolve rightful ownerships?”, IBM Research Report RC 20509 (1996).
J. ridrich, A.C. Baldoza, and R.J. Simard, “Robust digital watermarking based on key-dependent basis functions,” Preliminary Proc. Second International Information Hiding Workshop (1998).
D.L. Hecht, “Embedded data glyph technology for hardcopy digital documents,” SPIE 2171 (1995).
A. Herrigal, J.J ó Ruanaidh, W. Peterson, S. Pereira, and T. Pun, “Secure copyright protection techniques for digital images,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998).
Proceedings of the IEEE International Conference on Image Processing, ICIP-47, Vols. I–III, IEEE Computer Society, Los Alamitos, CA, 1997.
N.F. Johnson and S. Sajodia, “Steganalysis of images created using current steganography software,” Preliminary Proc. Second International Information Hiding Workshop (1998).
D. Karakos and A. Papamarcou, “Some results on the information capacity of authentication channels,” Dept. of Electrical Engineering, University of Maryland, College Park, MD, manuscript, 1997.
J. Kilian, F.T. Leighton, L. Matheson, T. Shamoon, R. Tarjan, and F. Zane, “Resistance of digital fingerprints to collusional attacks,” unpublished manuscript (1997).
J. Lacy, S.R. Quackenbush, A. Reibman, and J.H. Snyder, “Intellectual property protection systems and digital watermarking,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998).
J. P. Linnartz, T. Kalker, and G. Depovere, “Modelling the false alarm and missed detection rate for electronic watermarks,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998)
J. P. Linnartz and M. Van Dijk, “Analysis of the sensitivity attack against electronic watermarks in images,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998).
M. Maes, “Twin peaks: the histogram attack on fixed depth image watermarks,” Preliminary Proc. Second International Information Hiding Workshop (1998).
K.A.Magerlein, G.W. Braudaway, and F.C. Mintzer, “Protecting publicallyavailable images with a visible image watermark,” Proc. SPIE Conf. on Optical Security and Counterfeit Deterrence Techniques, SPIE 2659 (1996), pp. 126–132.
J.J.K ó Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” IEE Proc. on Vision, Image and Signal Processing 143 (1996), pp. 250–256.
J.J.K. ó Ruanaidh, W.J. Dowling, and F.M. Boland, “Phase watermarking of digital images,” Proc. IEEE International Conference on Image Processing ICIP-96 (1996), pp. 239–242.
J. ó Ruanaidh and T. Pun, “Rotation, translation and scale invariant digital image watermarking,” Proceedings 1997 IEEE International Conference on Image Processing (1997), Vol. I, pp. 536–539.
F. Peticolas, R. Anderson, and M. Kuhn, “Attacks on copyright marking systems,” Preliminary Proc. Second International Information Hiding Workshop (1998).
B. Pfitzmann and M. Shaunter, “Anonymous fingerprinting, (extended abstract),” EUROCRYPT '96, Lecture Notes in Computer Science 1070, Springer-Verlag, Berlin (1996), pp. 84–95.
B. Pfitzmann and M. Waidner, “Asymmetric fingerprinting for larger collusions,” 4th ACM Conf. on Computer and Communications Security (1997), pp. 151–160.
B. Pfitzmann and M. Waidner, “Anonymous fingerprinting,” IBM Research Report RZ 2221 (1996).
A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “DCT-based watermark recovering without resorting to the uncorrupted original image,” Proceedings 1997 IEEE International Conference on Image Processing (1997) Vol. I, pp. 520–523.
C. Podilchuck and W. Zeng, “Digital image watermarking using visual models,” IS&T/SPIE Electronic Imaging 3016 (1997).
V. Poor, An Introduction to Signal Detection and Estimation, 2nd Edition, Springer-Verlag, New York, 1994.
Preliminary Proceedings of the Second International Information Hiding Workshop, 1998.
R. van Schyndel, A. Tirkel, and C. Osborne, “A digital watermark,” Proceedings 1994 IEEE International Conference on Image Processing, (1994), pp. 86–90.
R. van Schyndel, A. Tirkel, and C. Osborne, “Towards a robust digital watermark,” Proceedings DICTA-95 (1993), pp. 378–385.
Y. Sheng and H.H. Arsenault, “Experiments on pattern recognition using invariant Fourier-Mellon descriptors,” J. Optical Society of America A 3 (1986), pp. 771–776.
J.R. Smith and B.O. Comisky, “Modulation and information hiding in images,” Information Hiding, First International Workshop Procedings, R. Anderson, ed., Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin (1996), pp. 207–226.
S. Sowers and A. Youssef, “Testing digital watermark resistance to destruction,” Preliminary Proc. Second International Information Hiding Workshop (1998).
M.D. Swanson, B. Zhu, and A.A. Tewfik, “Transparent robust image watermarking,” Proc IEEE Int. Conf. On Image Processing, ICIP-96 Vol. 3, (1996) pp. 211–214.
M.D. Swanson, B. Zhu, and A.H. Tewfik, “Robust image watermaking using perceptual models,” unpublished manuscipt (1997).
M. Swanson, B. Zhu, and A. Tewfik, “Data Hiding for Video in Video,” Proceedings 1997 IEEE International Conference on Image Processing, (1997), Vol II, pp. 676–679.
A. Tirkel, G. Rankin, R. van Schyndel, W. Ho, N. Mee, and C Osborne, “Electronic watermark,” Proceedings DICTA-93 (1993), pp. 666–673.
N. Wagner, “Fingerprinting,” Proc. 1983 IEEE Symp. on Security and Privacy (1983), pp. 18–22.
W. Zeng and B. Liu, “On resolving rightful ownerships of digital images by invisible watermarks,” Proc. IEEE Int. Conf. on Image Processing, ICIP-97 (1997), Vol. I, pp. 552–555.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Matheson, L.R., Mitchell, S.G., Shamoon, T.G., Tarjan, R.E., Zane, F. (1998). Robustness and security of digital watermarks. In: Hirchfeld, R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055486
Download citation
DOI: https://doi.org/10.1007/BFb0055486
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64951-9
Online ISBN: 978-3-540-53918-6
eBook Packages: Springer Book Archive