Abstract
The current image watermarking schemes only involve one key, thus can not resolve the problem of joint ownership. This paper proposes two totally new algorithms that make use of a secret sharing scheme in cryptography to address this problem. The first one applies Shamir's (2,2) threshold scheme to the watermarking algorithm. A watermark, which is a gaussian distributed random vector determined by two keys, is embedded to selected coefficients in all middle bands in the wavelet domain of an image, so that only when the two keys are put together can the ownership be verified. The second algorithm is a modification of the first one. Three random watermarks are embedded to middle bands in the wavelet domain of an image. For the watermark detection, two thresholds are set, so the watermark detector can verify partial ownership as well as full ownership. Experimental results show that both algorithms have the desired properties such as invisibility, reliable detection and robustness against a wide range of imaging processing operations.
Similar content being viewed by others
References
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, Vol. 35, Nos. 3/4, pp. 164–173, 1996.
B. Chen and G.W. Wornell, “Implementations of quantization index modulation methods for digital watermarking and information embedding of multimedia,” Journal of VLSI Signal Processing, Vol. 27, pp. 7–33, 2001a.
B. Chen and G.W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. on Information Theory, Vol. 47, No. 4, pp. 1423–1443, 2001.
Q. Cheng and T. Huang, “An image watermarking technique using pyramid transform,” in Proc. of the ACM Multimedia, 2001.
M. Costa, “Writing on dirty paper,” IEEE Trans. on Information Theory, Vol. 29, No. 3, 1983.
I. Cox, M. Miller, and J. Bloom, “Watermarking applications and their properties,” in Proc. of Int. Conf. Information Technology: Coding and Computing, 2000, pp. 6–10.
I.J. Cox, J. Kilian, T. Leighton, and T.G. Shamoon, ‘Secure spread spectrum watermarking for Multimedia,” IEEE Trans. on Image Processing, Vol. 6, No. 12, pp. 1673–1687, 1997.
I.J. Cox, M.L. Miller, and A. McKellips, “Watermarking as Communications with side information,” in Proc. of the IEEE, 1999, Vol. 87, No. 7, pp. 1127–1141.
I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking, Morgan Kaufmann, 2001.
R. Dugad, K. Ratakonda, and N. Ahuja, “A new wavelet-based scheme for watermarking images,” in IEEE Int. Conf. On Image Processing, 1998.
J. Eggers and B. Girod, “Quantization effects on digital watermarks,” Signal Processing, Vol. 81, No. 2, pp. 239–263, 1999.
J. Fridrich, A.C. Baldoza, and R.J. Simard, “Robust digital watermarking based on key-dependent basis functions,” in Proc. of Int. Conf. on Imaging Science, Systems and Technology, 1999.
H. Guo and N.D. Georganas, “Digital image watermarking for joint ownership,” in Proceedings of ACM Multimedia, 2002.
J. Hernandez, M. Amado, and F. Perez-Gonzalez, “Dct-domain watermarking techniques for still images detector performance analysis and a new structure,” IEEE Trans. on Image Processing, Vol. 1, No. 9, pp. 55–68, 2000.
C.T. Hsu and J.L. Wu, “Multiresolution watermarking for digital images,” IEEE Trans. on Circuits and Systems Part II: Analog and Digital Signal Processing, Vol. 45, No. 8, pp. 1097–1101, 1998.
W.A. Jackson, K.M. Martin, and C.M. O'Keefe, “Efficient secret sharing without a mutually trusted authority,” in Advances in Cryptology—Crypto'95(Lecture Notes in computer Science, 1995, pp. 183–193.
V. Licks and R. Jordan, “On digital image watermarking robust to geometric transformations,” in Proc. Of Int. Conf. on Image Processing, 2000.
C.Y. Lin, M. Wu, Y.M. Lui, J.A. Bloom, M.L. Miller, and I.J. Cox, “Rotation, scale, and translation resilient public watermarking for images,” IEEE Trans. On Image Processing, Vol. 10, No. 5, pp. 767–782, 1999.
C.S. Lu, S.K. Huang, C.J. Sze, and H.Y.M. Liao, “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, Vol. 2, No. 4, pp. 209–224, 2000.
F. Mintzer, G.W. Braudaway, and A.E. Bell, “Opportunities for watermarking standards,” Communications of the ACM, Vol. 41, No. 7, pp. 57–64, 1998.
A. Piva, M. Barni, F. Berbolini, and V. Cappellini, “DCT-based watermark recovery without resorting to the uncorrupted original image,” in Proc. of IEEE Int. Conf. on Image Processing, 1997.
C.I. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual models,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 525–540, 1998.
J. Puate and F. Jordan, “Using fractal compression scheme to embed a digital signature into an image,” in Proc. of SPIE Photonics East Symposium, 1996.
A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, No. 11, 1979.
D.R. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.
M.D. Swanson, B. Zhu, and A.H. Tewfik, “Multiresolution scene-based video watermarking using perceptual models,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 540–550, 1997.
S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Content adaptive watermarking based on a stochastic multiresolution image modeling,” in Tenth European Signal Processing Conference, 2000.
M. Wu, H. Yu, and A. Gelman, “Multilevel data hiding for digital image and video,” in SPIE Photonics East, 1999.
Y. Zheng, T. Hardjono, and J. Seberry, “Reusing shares in secret sharing schemes,” The Computer Journal, Vol. 37, No. 3, pp. 199–205, 1994.
W. Zhu, Z. Xiong, and Y.Q. Zhang, “Multiresolution watermarking for images and video,” IEEE Trans. on Circuits and System for Video Technology, Vol. 9, No. 4, 1999.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Guo, H., Georganas, N.D. Jointly Verifying Ownership of an Image Using Digital Watermarking. Multimed Tools Appl 27, 323–349 (2005). https://doi.org/10.1007/s11042-005-3812-3
Issue Date:
DOI: https://doi.org/10.1007/s11042-005-3812-3