Abstract
During the last decade digital watermarking has become an active research area focused on digital data protection. The modern multimedia systems require powerful data protection algorithms. Namely, due to the advances in the development of digital data and the modern way of communication, a number of watermarking procedure has been proposed. The watermarking purposes are classified as: ownership protection, protection and proof of copyrights, data authenticity protection, tracking of digital copies, copy and access control. This chapter deals with the concepts of watermark embedding and watermark detection theory. Several interesting and commonly used algorithms for image and audio watermarking are presented. As an advanced level, the recently developed combined time-frequency watermarking approaches are also considered.
Keywords
Image Watermark Watermark Embedding Watermark Technique Audio Watermark Watermark SignalReferences
- 1.Al-khassaweneh M, Aviyente S (2005) A time-frequency based perceptual and robust watermarking scheme. Proc. of EUSIPCO 2005, AntalyaGoogle Scholar
- 2.Barni M, Bartolini F (2004) Watermarking systems engineering. Marcel Dekker, Inc., New York, NYGoogle Scholar
- 3.Barkat B, Sattar F (2010) Time-frequency and time-scale-based fragile watermarking methods for image authentication. EURASIP J Adv Signal Process 2010, 408109. doi: 10.1155/2010/408109 CrossRefMATHGoogle Scholar
- 4.Battiato S, Emanuel S, Ulges A, Worring M (2012) Multimedia in forensics, security, and intelligence. IEEE Multimedia Mag 19(1):17–19CrossRefGoogle Scholar
- 5.Briassouli A, Strintzis MG (2004) Locally optimum nonlinearities for DCT watermark detection. IEEE Trans Image Process 13(12):1604–1618CrossRefGoogle Scholar
- 6.Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking. Academic, LondonGoogle Scholar
- 7.Dittmann J, Megías D, Lang A, Herrera-Joancomartí J (2006) Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity. In: Transactions on Data Hiding and Multimedia Security I, vol 4300, Lecture Notes in Computer Science. Springer, Berlin, pp 1–40CrossRefGoogle Scholar
- 8.Djurović I, Stanković S, Pitas I (2001) Digital watermarking in the fractional Fourier transformation domain. J Netw Comput Appl 24(2):167–173CrossRefMATHGoogle Scholar
- 9.Esmaili S, Krishnan S, Raahemifar K (2003) Audio watermarking time-frequency characteristics. Can J Elect Comput Eng 28(2):57–61CrossRefGoogle Scholar
- 10.Foo SW, Ho SM, Ng LM (2004) Audio watermarking using time-frequency compression expansion. Proc. of the Int. Symp. on Circuits and Systems, ISCAS 04, 3: III - 201-4Google Scholar
- 11.Hannigan BT, Reed A, Bradley B (2001) Digital watermarking using improved human visual system model. Proc SPIE 4314:468–474CrossRefGoogle Scholar
- 12.Heeger D (1997) Signal detection theory, Teaching Handout. Department of Psychology, Stanford University, Stanford, CAGoogle Scholar
- 13.Hernandez JR, Amado M, Perez Gonzales F (2000) DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans Image Process 9:55–68CrossRefGoogle Scholar
- 14.Kang X, Huang J, Zeng W (2008) Improving robustness of quantization-based image watermarking via adaptive receiver. IEEE Trans Multimedia 10(6):953–959CrossRefGoogle Scholar
- 15.Katzenbeisser S, Petitcolas F (2000) Information hiding: techniques for steganography and digital watermarking. Artech House, Norwood, MAGoogle Scholar
- 16.Kirovski D, Malvar HS (2003) Spread-spectrum watermarking of audio signals. IEEE Trans Signal Process 51(4):1020–1033MathSciNetCrossRefGoogle Scholar
- 17.Mobasseri BG, Zhang Y, Amin MG, Dogahe BM (2005) Designing robust watermarks using polynomial phase exponentials. Proc. of Acoustics, Speech, and Signal Processing (ICASSP’05), Philadelphia, PA, vol 2, pp ii/833–ii/836Google Scholar
- 18.Muharemagić E, Furht B (2006) Survey of watermarking techniques and applications, Chapter 3. In: Furht B, Kirovski D (eds) Multimedia watermarking techniques and applications. Auerbach Publication, Boca Raton, FL, pp 91–130Google Scholar
- 19.Nikolaidis A, Pitas I (2003) Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans Image Process 12(5):563–571CrossRefGoogle Scholar
- 20.Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Information, vol 87, July 1999Google Scholar
- 21.Podilchuk CI, Zheng W (1998) Image adaptive watermarking using visual models. IEEE J Select Areas Commun 16:525–539CrossRefGoogle Scholar
- 22.Stankovic L, Stankovic S, Djurovic I (2000) Space/spatial-frequency based filtering. IEEE Trans Signal Process 48(8):2343–2352MathSciNetCrossRefMATHGoogle Scholar
- 23.Stanković S, Djurović I, Herpers R, Stanković LJ (2003) An approach to the optimal watermark detection. AEUE Int J Elect Commun 57(5):355–357CrossRefGoogle Scholar
- 24.Stanković S, Djurović I, Pitas I (2001) Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution. IEEE Trans Image Process 10:650–658CrossRefMATHGoogle Scholar
- 25.Stankovic S, Orovic I, Chabert M, Mobasseri B (2013) Image watermarking based on the space/spatial-frequency analysis and Hermite functions expansion. J Elect Imaging 22(1):013014CrossRefGoogle Scholar
- 26.Stankovic S, Orovic I, Mobasseri B, Chabert M (2012) A Robust procedure for image watermarking based on the Hermite projection method. Automatika 53(4):335Google Scholar
- 27.Stanković S, Orović I, Žarić N (2008) Robust watermarking procedure based on JPEG-DCT image compression. J Elect Imaging 17(4):043001CrossRefGoogle Scholar
- 28.Stanković S, Orović I, Žarić N (2010) An application of multidimensional time-frequency analysis as a base for the unified watermarking approach. IEEE Trans Image Process 19(2):736–745MathSciNetCrossRefGoogle Scholar
- 29.Stanković S (2000) About time-variant filtering of speech signals with time-frequency distributions for hands-free telephone systems. Signal Process 80(9):1777–1785CrossRefMATHGoogle Scholar
- 30.Stanković S, Orović I, Žarić N (2008) Robust speech watermarking in the time-frequency domain. EURASIP J Adv Signal Process 2008:519206MATHGoogle Scholar
- 31.Steinebach M, Dittmann J (2003) Watermarking-based digital audio data authentication. EURASIP J Appl Signal Process 2003(10):1001–1015CrossRefGoogle Scholar
- 32.Wang FH, Pan JS, Jain LC (2009) Innovations in digital watermarking techniques. Studies in computational intelligence. Springer, New York, NYGoogle Scholar
- 33.Wickens TD (2002) Elementary signal detection theory. Oxford University Press, OxfordGoogle Scholar