Abstract
The concept of digital rights management architecture for multimedia will be presented in this paper, with focus on robust digital image watermarking, which is able to undergo geometrical attacks performed against the embedded watermarks. Geometrical attacks are still an open problem for many digital watermarking algorithms used in present time. Most of geometrical attacks can be described by using affine transforms. A new approach to improve robustness against geometrical attacks is presented. The discrete Fourier transform and log-polar mapping are used for watermark embedding and for watermark detection. Some attacks against the embedded watermarks are performed and the results are given. Also two modifications, usage of the proposed method as a synchronization template and implementation for the color images, are presented and experimental results are given too.
Similar content being viewed by others
References
Čižmár, A., Doboš, L., & Papaj, J. (2009). Integration of modified security service vector to the Manet. Journal of Electrical and Electronics Engineering, 2(1), 135–140. ISSN 1844–6035.
Deguillaume, F., Voloshynovskiy, S., & Pun, T. (2002). A method for the estimation and recovering from general affine transforms in digital watermarking applications. In Security and watermarking of multimedia contents IV: Vol. 4675. Proc. SPIE, 04/2002 (pp. 313–322). Bellinghem: SPIE Press.
Akalu, R., & Kundur, D. (2004). Technological protection measures in the courts: law, engineering, and DRM lessons learned from the failure of the content scrambling system. In digital rights: management, protection, standardization. IEEE Signal Processing Magazine, 21(2), 109–117.
Furht, B., Muharemagic, E., & Soced, D. (2005). Multimedia encryption and watermarking. Berlin: Springer.
Hovančák, R., & Levický, D. (2003). Comparison of watermarking methods using DCT transformation. In Radioelektronika 2003: 13th international Czech–Slovak scientific conference. Conference proceedings, Brno, Czech Republic, May 6–7, 2003, (pp. 403–406). Brno: University of Technology. ISBN 80-214-2383-8.
Kundur, D., & Karthik, K. (2004). Video fingerprinting and encryption principles for digital rights management. In enabling security technologies for digital rights management. Proceeding of the IEEE, 92(8), 918–932.
Katzenbeisser, S., & Petitcolas, F. A. (2000). Information hiding techniques for steganography and digital watermarking. Norwood: Artech House.
Liu, Y., & Zhao, J. (2004). Rotation, scaling, translation invariant image watermarking based on radon transform. In First Canadian conference on computer and robot vision, Ottawa, Canada, May 17–19 (pp. 225–232).
Ridzoň, R., & Levický, D. (2007). Robust digital watermarketing based on the log-polar mapping. Radioengineering, 16(4), 76–81. ISSN 1210-2512.
Ridzoň, R., & Levický, D. (2008). Robust digital watermarking in color images. In IWSSIP 2008: proceedings of 15th international conference on systems, signals and image processings, Bratislava, Slovak Republic, 25–28 June, 2008 (pp. 425–428). Bratislava: Slovak University of Technology. ISBN 978-80-227-2856-0.
Ruanaidh, J. J. K., & Pun, T. (1997). Rotation, scale and translation invariant digital image watermarking. In Proc. IEEE int. conf. image processing 1997 (ICIP 97), Santa Barbara, CA, Oct. 1997 (Vol. 1, pp. 536–539).
Sencar, H. T., Ramkumar, M., & Akansu, A. N. (2004). Data hiding fundamentals and applications. Content security in digital multimedia. Amsterdam: Elsevier.
Shih, F. Y. (2008). Digital watermarking and steganography. Boca Raton: CRC Press. ISBN 978-1-4200-4757-8.
Voloshynovskiy, S., et al. (2001). Attack modeling: towards a second generation watermarking benchmark. Signal Processing, 81(6), 1177–1214. Special Issue on Information Theoretic Issues in Digital Watermarking.
Zheng, D., Zhao, J., & EL Saddik, A.: (2003). RST invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 753–765. Special Issue on Authentication, Copyright Protection and Information Hiding.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ridzoň, R., Levický, D. Content protection in grayscale and color images based on robust digital watermarking. Telecommun Syst 52, 1617–1631 (2013). https://doi.org/10.1007/s11235-011-9655-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9655-5