Skip to main content
Log in

Jointly Verifying Ownership of an Image Using Digital Watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The current image watermarking schemes only involve one key, thus can not resolve the problem of joint ownership. This paper proposes two totally new algorithms that make use of a secret sharing scheme in cryptography to address this problem. The first one applies Shamir's (2,2) threshold scheme to the watermarking algorithm. A watermark, which is a gaussian distributed random vector determined by two keys, is embedded to selected coefficients in all middle bands in the wavelet domain of an image, so that only when the two keys are put together can the ownership be verified. The second algorithm is a modification of the first one. Three random watermarks are embedded to middle bands in the wavelet domain of an image. For the watermark detection, two thresholds are set, so the watermark detector can verify partial ownership as well as full ownership. Experimental results show that both algorithms have the desired properties such as invisibility, reliable detection and robustness against a wide range of imaging processing operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, Vol. 35, Nos. 3/4, pp. 164–173, 1996.

    Google Scholar 

  2. B. Chen and G.W. Wornell, “Implementations of quantization index modulation methods for digital watermarking and information embedding of multimedia,” Journal of VLSI Signal Processing, Vol. 27, pp. 7–33, 2001a.

    Google Scholar 

  3. B. Chen and G.W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. on Information Theory, Vol. 47, No. 4, pp. 1423–1443, 2001.

    Article  MathSciNet  Google Scholar 

  4. Q. Cheng and T. Huang, “An image watermarking technique using pyramid transform,” in Proc. of the ACM Multimedia, 2001.

  5. M. Costa, “Writing on dirty paper,” IEEE Trans. on Information Theory, Vol. 29, No. 3, 1983.

  6. I. Cox, M. Miller, and J. Bloom, “Watermarking applications and their properties,” in Proc. of Int. Conf. Information Technology: Coding and Computing, 2000, pp. 6–10.

  7. I.J. Cox, J. Kilian, T. Leighton, and T.G. Shamoon, ‘Secure spread spectrum watermarking for Multimedia,” IEEE Trans. on Image Processing, Vol. 6, No. 12, pp. 1673–1687, 1997.

    Article  Google Scholar 

  8. I.J. Cox, M.L. Miller, and A. McKellips, “Watermarking as Communications with side information,” in Proc. of the IEEE, 1999, Vol. 87, No. 7, pp. 1127–1141.

  9. I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking, Morgan Kaufmann, 2001.

  10. R. Dugad, K. Ratakonda, and N. Ahuja, “A new wavelet-based scheme for watermarking images,” in IEEE Int. Conf. On Image Processing, 1998.

  11. J. Eggers and B. Girod, “Quantization effects on digital watermarks,” Signal Processing, Vol. 81, No. 2, pp. 239–263, 1999.

    Google Scholar 

  12. J. Fridrich, A.C. Baldoza, and R.J. Simard, “Robust digital watermarking based on key-dependent basis functions,” in Proc. of Int. Conf. on Imaging Science, Systems and Technology, 1999.

  13. H. Guo and N.D. Georganas, “Digital image watermarking for joint ownership,” in Proceedings of ACM Multimedia, 2002.

  14. J. Hernandez, M. Amado, and F. Perez-Gonzalez, “Dct-domain watermarking techniques for still images detector performance analysis and a new structure,” IEEE Trans. on Image Processing, Vol. 1, No. 9, pp. 55–68, 2000.

    Google Scholar 

  15. C.T. Hsu and J.L. Wu, “Multiresolution watermarking for digital images,” IEEE Trans. on Circuits and Systems Part II: Analog and Digital Signal Processing, Vol. 45, No. 8, pp. 1097–1101, 1998.

    Google Scholar 

  16. W.A. Jackson, K.M. Martin, and C.M. O'Keefe, “Efficient secret sharing without a mutually trusted authority,” in Advances in Cryptology—Crypto'95(Lecture Notes in computer Science, 1995, pp. 183–193.

  17. V. Licks and R. Jordan, “On digital image watermarking robust to geometric transformations,” in Proc. Of Int. Conf. on Image Processing, 2000.

  18. C.Y. Lin, M. Wu, Y.M. Lui, J.A. Bloom, M.L. Miller, and I.J. Cox, “Rotation, scale, and translation resilient public watermarking for images,” IEEE Trans. On Image Processing, Vol. 10, No. 5, pp. 767–782, 1999.

    Google Scholar 

  19. C.S. Lu, S.K. Huang, C.J. Sze, and H.Y.M. Liao, “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, Vol. 2, No. 4, pp. 209–224, 2000.

    Google Scholar 

  20. F. Mintzer, G.W. Braudaway, and A.E. Bell, “Opportunities for watermarking standards,” Communications of the ACM, Vol. 41, No. 7, pp. 57–64, 1998.

    Article  Google Scholar 

  21. A. Piva, M. Barni, F. Berbolini, and V. Cappellini, “DCT-based watermark recovery without resorting to the uncorrupted original image,” in Proc. of IEEE Int. Conf. on Image Processing, 1997.

  22. C.I. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual models,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 525–540, 1998.

    Article  Google Scholar 

  23. J. Puate and F. Jordan, “Using fractal compression scheme to embed a digital signature into an image,” in Proc. of SPIE Photonics East Symposium, 1996.

  24. A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, No. 11, 1979.

  25. D.R. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.

  26. M.D. Swanson, B. Zhu, and A.H. Tewfik, “Multiresolution scene-based video watermarking using perceptual models,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 540–550, 1997.

    Google Scholar 

  27. S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Content adaptive watermarking based on a stochastic multiresolution image modeling,” in Tenth European Signal Processing Conference, 2000.

  28. M. Wu, H. Yu, and A. Gelman, “Multilevel data hiding for digital image and video,” in SPIE Photonics East, 1999.

  29. Y. Zheng, T. Hardjono, and J. Seberry, “Reusing shares in secret sharing schemes,” The Computer Journal, Vol. 37, No. 3, pp. 199–205, 1994.

    Article  Google Scholar 

  30. W. Zhu, Z. Xiong, and Y.Q. Zhang, “Multiresolution watermarking for images and video,” IEEE Trans. on Circuits and System for Video Technology, Vol. 9, No. 4, 1999.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huiping Guo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Guo, H., Georganas, N.D. Jointly Verifying Ownership of an Image Using Digital Watermarking. Multimed Tools Appl 27, 323–349 (2005). https://doi.org/10.1007/s11042-005-3812-3

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-005-3812-3

Keywords

Navigation