A Statistical Approach for Ownership Identification of Digital Images

  • Ching-Sheng Hsu
  • Shu-Fen Tu
  • Young-Chang Hou
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4179)


In this paper, we propose an ownership identification scheme for digital images with binary and gray-level ownership statements. The proposed method uses the theories and properties of sampling distribution of means to satisfy the requirements of robustness and security. Essentially, our method will not really insert the ownership statement into the host image. Instead, the ownership share will be generated by the sampling method as a key to reveal the ownership statement. Besides, our method allows ownership statements to be of any size and avoids the hidden ownership statement to be destroyed by the latter ones. When the rightful ownership of the image needs to be identified, our method can reveal the ownership statement without resorting to the original image. Finally, several common attacks to the image will be held to verify the robustness and the security is also analyzed.


Watermark Scheme Secret Image Ownership Statement Host Image Digital Watermark 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Braudaway, G.W., Magerlein, K.A., Mintzer, F.: Protecting Publicly-available Images with a Visible Image Watermark. In: Proc. SPIE, vol. 2659, pp. 126–133 (1996)Google Scholar
  2. 2.
    Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  3. 3.
    Low, S., Maxemchuk, N.: Performance Comparison of Two Text Marking Methods. IEEE J. Selected Areas in Communications 16(4), 561–572 (1998)CrossRefGoogle Scholar
  4. 4.
    Ohbuchi, R., Masuda, H., Aono, M.: Watermarking Three-Dimensional Polygonal Models through Geometric and Topological Modifications. IEEE J. Selected Areas in Communications 16(4), 551–560 (1998)CrossRefGoogle Scholar
  5. 5.
    Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking, pp. 101–109. Artech house, Norwood (2000)Google Scholar
  6. 6.
    Hou, Y.C., Chen, P.M.: An Asymmetric Watermarking Scheme Based on Visual Cryptography. In: Proc. Fifth Signal Process. Conf., vol. 2, pp. 992–995 (2000)Google Scholar
  7. 7.
    Chang, C.C., Hsiao, J.Y., Yeh, J.C.: A Colour Image Copyright Protection Scheme Based on Visual Cryptography and Discrete Cosine Transform. The Imaging Sci. J. 50, 133–140 (2002)Google Scholar
  8. 8.
    Kim, W.S., Hyung, O.H., Park, R.H.: Wavelet Based Watermarking Method for Digital Images using the Human Visual System. Electron. Lett. 35, 466–468 (1999)CrossRefGoogle Scholar
  9. 9.
    Berenson, M.L., Levine, D.M.: Basic Business Statistics: Concepts and Applications, pp. 337–353. Prentice-Hall, New Jersey (1999)zbMATHGoogle Scholar
  10. 10.
    Acklam, P.J.: An Algorithm for Computing the Inverse Normal Cumulative Distribution Function (2004), Available:
  11. 11.
    Bialas, W.F.: Lecture Notes in Applied Probability. Department of Industrial Engineering, the State University of New York at Buffalo (Summer 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ching-Sheng Hsu
    • 1
  • Shu-Fen Tu
    • 2
  • Young-Chang Hou
    • 3
  1. 1.Department of Information ManagementMing Chuan UniversityTaoyuan CountyTaiwan, R.O.C.
  2. 2.Department of Information ManagementChinese Culture UniversityTaipei CityTaiwan, R.O.C.
  3. 3.Department of Information ManagementTamkang UniversityTaipei CountyR.O.C., Taiwan

Personalised recommendations