Robust Watermarking for Images Based on Color Manipulation

  • Sebastiano Battiato
  • Dario Catalano
  • Giovanni Gallo
  • Rosario Gennaro
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1768)


In this paper we present a new efficient watermarking scheme for images. The basic idea of our method is to alter the colors of the given image in a suitable but imperceptible way. This is accomplished by moving the coordinates of each color in the color opponency space. The scheme is shown to be robust against a large class of image manipulations. The robustness of the scheme is also theoretically analyzed and it is shown to depend on the number of colors in the image being marked.


Detection Algorithm Color Space Watermark Scheme Digital Watermark Marked Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Acken, J.M.: Low Watermarking Adds Value to Digital Content. Communications of the ACM 41(7), 75–77 (1998)CrossRefGoogle Scholar
  2. 2.
    Bell, A.E., Braudaway, G.W., Mintzer, F.: Opportunities for Watermarking Standards. Communications of the ACM 41(7), 57–64 (1998)CrossRefGoogle Scholar
  3. 3.
    Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. In: Proc. of SPIE,  Vol. 2420, p. 40 (1995)Google Scholar
  4. 4.
    Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)Google Scholar
  5. 5.
    Brassil, J., Low, S., Maxemchuk, N., O’Gorman, L.: Electronic marking and identification techniques to discourage document copying. In: Proc. of Infocom 1994, pp. 1278–1287 (1994)Google Scholar
  6. 6.
    Ballard, D.H., Brown, C.M.: Computer Vision. Prenctice Hall, Inc., Englewood Cliffs (1982)Google Scholar
  7. 7.
    Caronni, G.: Assuring ownership rights for digital images. In: Proc. of reliable IT Systems, VIS 1995. Vieweg Publishing Company (1995)Google Scholar
  8. 8.
    Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. IEEE Transaction on Image Processing 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  9. 9.
    Craver, S., Yeo, B.-L., Yeung, M.: Technical Trials and Legal Tribulations. Communications of the ACM 41(7), 45–56 (1998)CrossRefGoogle Scholar
  10. 10.
    Ergun, F., Kilian, J., Kumar, S.R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)Google Scholar
  11. 11.
    Fleck, M.M., Forsyth, D.A., Bregler, C.: Finding Naked People, Lectures in Computer Science (1996)Google Scholar
  12. 12.
    Foley, J.D., Dam, A.V., Feiner, S.K., Hughes, J.F.: Computer Graphics, Principles and Practice. Addison Wesley, Reading (1990)Google Scholar
  13. 13.
    Glassner, A.S.: Principle of Digital Images. Morgan Kaufmann Publishers Inc, San Francisco (1995)Google Scholar
  14. 14.
    Goldreich, O.: Foundations of Cryptography (Fragments of a Book), Available online from
  15. 15.
    Koch, E., Rindfrey, J., Zhao, J.: Copyright protection for multimedia data. In: Proc. of the Int. Conf. on Digital Media and Electronic Publishing (1994)Google Scholar
  16. 16.
    Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Delp, E., et al. (eds.) proceedings of Electronic Imaging 1999, Security and Watermarking of Multimedia Contents, San José, CA USA, vol. 3657 (1999)Google Scholar
  17. 17.
    Luo, C., Koch, E., Zhao, J.: Business Today and Tomorrow. Communications of the ACM 41(7), 67–72 (1998)CrossRefGoogle Scholar
  18. 18.
    Macq, B.M., Quisquater, J.J.: Cryptology for digital TV broadcasting. Proc. of IEEE  83(6), 944–957 (1995)Google Scholar
  19. 19.
    Matsui, K., Tanaka, K.: Video-steganography. In: IMA Intellectual Property Project Proceedings, vol. 1, pp. 187–206 (1994)Google Scholar
  20. 20.
    Memon, N., Wah, P.: Wong Protecting Digital Media Content. Communications of the ACM 41(7), 35–43 (1998)CrossRefGoogle Scholar
  21. 21.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography.Google Scholar
  22. 22.
    Netravali, A.N., Haskell, B.G.: Digital Pictures:Representation and compression. In: Application of Communication Theory. Plenum Press, NY (1988)Google Scholar
  23. 23.
    Podilchuk, C.I., Zeng, W.: Image Adaptive Watermarking Algorithm Based on a Human Visual model. Signal Processing 66(3), 337–355 (1998)CrossRefGoogle Scholar
  24. 24.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  25. 25.
    Pitas, I., Voyatzis, G.: Protecting Digital-Image Copyrights: A Framework. IEEE Computer Graphics and Applications 19(1), 18–24 (1999)CrossRefGoogle Scholar
  26. 26.
    Van Schyndel, R., Tirkel, A., Osborne, C.: A Digital watermark. In: Proceedings of ICIP, pp. 86–90. IEEE Press, Los Alamitos (1994)Google Scholar
  27. 27.
    Tanaka, K., Nakamura, Y., Matsui, K.: Embedding secret information into a dithered multi-level image. In: Proc. 1990 IEEE Military Communications Conference, pp. 216–220 (1990)Google Scholar
  28. 28.
    Yeung, M.: Digital Watermarking. Comm. of the ACM 41(7), 31–33 (1998)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Sebastiano Battiato
    • 1
  • Dario Catalano
    • 1
  • Giovanni Gallo
    • 1
  • Rosario Gennaro
    • 2
  1. 1.Dipartimento di MatematicaUniversita’ di CataniaCatania
  2. 2.IBM T.J. Watson Research CenterNew YorkUSA

Personalised recommendations