Skip to main content

Robustness and security of digital watermarks

  • Conference paper
  • First Online:
Financial Cryptography (FC 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1465))

Included in the following conference series:

Abstract

Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermarking landscape. The three main technical challenges faced by watermarking algorithms are fidelity, robustness and security. Current watermarking methods offer possibly acceptable fidelity and robustness against certain types of processing, such as data compression and noise addition, but are not sufficiently robust against geometric transforms such as scaling and cropping of images. Theoretical approaches have been developed that could lead to secure watermarking methods, but substantial gaps remain between theory and practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson, Ed., Information Hiding, First International Workshop Proceedings, Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin, 1996.

    Google Scholar 

  2. W. Bender, D. Gruhl, N. Marimoto, and A. La, “Techniques for data hiding,” IBM Systems Journal 35 (1996).

    Google Scholar 

  3. G.R. Blakely, C. Meadors, and G.B. Purdy, “Fingerprinting long unforgiving messages,” Crypto '85, Lecture Notes in Computer Science 218, Springer-Verlag, Berlin (1985), pp.180–189.

    Google Scholar 

  4. D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” Crypto '95, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995, pp. 452–465.

    Google Scholar 

  5. R.D. Brandt and F. Lin, “Representations that uniquely characterize images modulo translation, rotation, and scaling,” Pattern Recognition Letters 17 (1996), pp. 1001–1015.

    Article  Google Scholar 

  6. G. W. Braudaway, “Protecting publicly-available images with an invisible image watermark,” Proc. IEEE Int. Conf. on Image Procesing, ICIP-97 (1997), Vol. I, pp. 524–51.

    Google Scholar 

  7. B. Chor, A. Fiat, and M. Naor, “Tracing traitors,” Crypto '94, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995, pp. 452–465.

    Google Scholar 

  8. I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing 6 (1997), 1673–1687.

    Article  Google Scholar 

  9. I. Cox and J.-P. Linnartz, “Public watermarks and resistance to tampering,” Proc. IEEE Conf. on Image Processing (1997), CD-ROM.

    Google Scholar 

  10. S. Craver, N. Memon, B.L. Yeo, and M. Yeung, “Can invisible watermarks resolve rightful ownerships?”, IBM Research Report RC 20509 (1996).

    Google Scholar 

  11. J. ridrich, A.C. Baldoza, and R.J. Simard, “Robust digital watermarking based on key-dependent basis functions,” Preliminary Proc. Second International Information Hiding Workshop (1998).

    Google Scholar 

  12. D.L. Hecht, “Embedded data glyph technology for hardcopy digital documents,” SPIE 2171 (1995).

    Google Scholar 

  13. A. Herrigal, J.J ó Ruanaidh, W. Peterson, S. Pereira, and T. Pun, “Secure copyright protection techniques for digital images,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998).

    Google Scholar 

  14. Proceedings of the IEEE International Conference on Image Processing, ICIP-47, Vols. I–III, IEEE Computer Society, Los Alamitos, CA, 1997.

    Google Scholar 

  15. N.F. Johnson and S. Sajodia, “Steganalysis of images created using current steganography software,” Preliminary Proc. Second International Information Hiding Workshop (1998).

    Google Scholar 

  16. D. Karakos and A. Papamarcou, “Some results on the information capacity of authentication channels,” Dept. of Electrical Engineering, University of Maryland, College Park, MD, manuscript, 1997.

    Google Scholar 

  17. J. Kilian, F.T. Leighton, L. Matheson, T. Shamoon, R. Tarjan, and F. Zane, “Resistance of digital fingerprints to collusional attacks,” unpublished manuscript (1997).

    Google Scholar 

  18. J. Lacy, S.R. Quackenbush, A. Reibman, and J.H. Snyder, “Intellectual property protection systems and digital watermarking,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998).

    Google Scholar 

  19. J. P. Linnartz, T. Kalker, and G. Depovere, “Modelling the false alarm and missed detection rate for electronic watermarks,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998)

    Google Scholar 

  20. J. P. Linnartz and M. Van Dijk, “Analysis of the sensitivity attack against electronic watermarks in images,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998).

    Google Scholar 

  21. M. Maes, “Twin peaks: the histogram attack on fixed depth image watermarks,” Preliminary Proc. Second International Information Hiding Workshop (1998).

    Google Scholar 

  22. K.A.Magerlein, G.W. Braudaway, and F.C. Mintzer, “Protecting publicallyavailable images with a visible image watermark,” Proc. SPIE Conf. on Optical Security and Counterfeit Deterrence Techniques, SPIE 2659 (1996), pp. 126–132.

    Google Scholar 

  23. J.J.K ó Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” IEE Proc. on Vision, Image and Signal Processing 143 (1996), pp. 250–256.

    Article  Google Scholar 

  24. J.J.K. ó Ruanaidh, W.J. Dowling, and F.M. Boland, “Phase watermarking of digital images,” Proc. IEEE International Conference on Image Processing ICIP-96 (1996), pp. 239–242.

    Google Scholar 

  25. J. ó Ruanaidh and T. Pun, “Rotation, translation and scale invariant digital image watermarking,” Proceedings 1997 IEEE International Conference on Image Processing (1997), Vol. I, pp. 536–539.

    Google Scholar 

  26. F. Peticolas, R. Anderson, and M. Kuhn, “Attacks on copyright marking systems,” Preliminary Proc. Second International Information Hiding Workshop (1998).

    Google Scholar 

  27. B. Pfitzmann and M. Shaunter, “Anonymous fingerprinting, (extended abstract),” EUROCRYPT '96, Lecture Notes in Computer Science 1070, Springer-Verlag, Berlin (1996), pp. 84–95.

    Google Scholar 

  28. B. Pfitzmann and M. Waidner, “Asymmetric fingerprinting for larger collusions,” 4th ACM Conf. on Computer and Communications Security (1997), pp. 151–160.

    Google Scholar 

  29. B. Pfitzmann and M. Waidner, “Anonymous fingerprinting,” IBM Research Report RZ 2221 (1996).

    Google Scholar 

  30. A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “DCT-based watermark recovering without resorting to the uncorrupted original image,” Proceedings 1997 IEEE International Conference on Image Processing (1997) Vol. I, pp. 520–523.

    Google Scholar 

  31. C. Podilchuck and W. Zeng, “Digital image watermarking using visual models,” IS&T/SPIE Electronic Imaging 3016 (1997).

    Google Scholar 

  32. V. Poor, An Introduction to Signal Detection and Estimation, 2nd Edition, Springer-Verlag, New York, 1994.

    MATH  Google Scholar 

  33. Preliminary Proceedings of the Second International Information Hiding Workshop, 1998.

    Google Scholar 

  34. R. van Schyndel, A. Tirkel, and C. Osborne, “A digital watermark,” Proceedings 1994 IEEE International Conference on Image Processing, (1994), pp. 86–90.

    Google Scholar 

  35. R. van Schyndel, A. Tirkel, and C. Osborne, “Towards a robust digital watermark,” Proceedings DICTA-95 (1993), pp. 378–385.

    Google Scholar 

  36. Y. Sheng and H.H. Arsenault, “Experiments on pattern recognition using invariant Fourier-Mellon descriptors,” J. Optical Society of America A 3 (1986), pp. 771–776.

    Article  Google Scholar 

  37. J.R. Smith and B.O. Comisky, “Modulation and information hiding in images,” Information Hiding, First International Workshop Procedings, R. Anderson, ed., Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin (1996), pp. 207–226.

    Google Scholar 

  38. S. Sowers and A. Youssef, “Testing digital watermark resistance to destruction,” Preliminary Proc. Second International Information Hiding Workshop (1998).

    Google Scholar 

  39. M.D. Swanson, B. Zhu, and A.A. Tewfik, “Transparent robust image watermarking,” Proc IEEE Int. Conf. On Image Processing, ICIP-96 Vol. 3, (1996) pp. 211–214.

    Google Scholar 

  40. M.D. Swanson, B. Zhu, and A.H. Tewfik, “Robust image watermaking using perceptual models,” unpublished manuscipt (1997).

    Google Scholar 

  41. M. Swanson, B. Zhu, and A. Tewfik, “Data Hiding for Video in Video,” Proceedings 1997 IEEE International Conference on Image Processing, (1997), Vol II, pp. 676–679.

    Google Scholar 

  42. A. Tirkel, G. Rankin, R. van Schyndel, W. Ho, N. Mee, and C Osborne, “Electronic watermark,” Proceedings DICTA-93 (1993), pp. 666–673.

    Google Scholar 

  43. N. Wagner, “Fingerprinting,” Proc. 1983 IEEE Symp. on Security and Privacy (1983), pp. 18–22.

    Google Scholar 

  44. W. Zeng and B. Liu, “On resolving rightful ownerships of digital images by invisible watermarks,” Proc. IEEE Int. Conf. on Image Processing, ICIP-97 (1997), Vol. I, pp. 552–555.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Rafael Hirchfeld

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Matheson, L.R., Mitchell, S.G., Shamoon, T.G., Tarjan, R.E., Zane, F. (1998). Robustness and security of digital watermarks. In: Hirchfeld, R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055486

Download citation

  • DOI: https://doi.org/10.1007/BFb0055486

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64951-9

  • Online ISBN: 978-3-540-53918-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics