Robustness and security of digital watermarks

  • Lesley R. Matheson
  • Stephen G. Mitchell
  • Talal G. Shamoon
  • Robert E. Tarjan
  • Francis Zane
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1465)

Abstract

Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermarking landscape. The three main technical challenges faced by watermarking algorithms are fidelity, robustness and security. Current watermarking methods offer possibly acceptable fidelity and robustness against certain types of processing, such as data compression and noise addition, but are not sufficiently robust against geometric transforms such as scaling and cropping of images. Theoretical approaches have been developed that could lead to secure watermarking methods, but substantial gaps remain between theory and practice.

Keywords

Resis Posit Bedding Defend Glyph 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    R. Anderson, Ed., Information Hiding, First International Workshop Proceedings, Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin, 1996.Google Scholar
  2. 2.
    W. Bender, D. Gruhl, N. Marimoto, and A. La, “Techniques for data hiding,” IBM Systems Journal 35 (1996).Google Scholar
  3. 3.
    G.R. Blakely, C. Meadors, and G.B. Purdy, “Fingerprinting long unforgiving messages,” Crypto '85, Lecture Notes in Computer Science 218, Springer-Verlag, Berlin (1985), pp.180–189.Google Scholar
  4. 4.
    D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” Crypto '95, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995, pp. 452–465.Google Scholar
  5. 5.
    R.D. Brandt and F. Lin, “Representations that uniquely characterize images modulo translation, rotation, and scaling,” Pattern Recognition Letters 17 (1996), pp. 1001–1015.CrossRefGoogle Scholar
  6. 6.
    G. W. Braudaway, “Protecting publicly-available images with an invisible image watermark,” Proc. IEEE Int. Conf. on Image Procesing, ICIP-97 (1997), Vol. I, pp. 524–51.Google Scholar
  7. 7.
    B. Chor, A. Fiat, and M. Naor, “Tracing traitors,” Crypto '94, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995, pp. 452–465.Google Scholar
  8. 8.
    I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing 6 (1997), 1673–1687.CrossRefGoogle Scholar
  9. 9.
    I. Cox and J.-P. Linnartz, “Public watermarks and resistance to tampering,” Proc. IEEE Conf. on Image Processing (1997), CD-ROM.Google Scholar
  10. 10.
    S. Craver, N. Memon, B.L. Yeo, and M. Yeung, “Can invisible watermarks resolve rightful ownerships?”, IBM Research Report RC 20509 (1996).Google Scholar
  11. 11.
    J. ridrich, A.C. Baldoza, and R.J. Simard, “Robust digital watermarking based on key-dependent basis functions,” Preliminary Proc. Second International Information Hiding Workshop (1998).Google Scholar
  12. 12.
    D.L. Hecht, “Embedded data glyph technology for hardcopy digital documents,” SPIE 2171 (1995).Google Scholar
  13. 13.
    A. Herrigal, J.J ó Ruanaidh, W. Peterson, S. Pereira, and T. Pun, “Secure copyright protection techniques for digital images,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998).Google Scholar
  14. 14.
    Proceedings of the IEEE International Conference on Image Processing, ICIP-47, Vols. I–III, IEEE Computer Society, Los Alamitos, CA, 1997.Google Scholar
  15. 15.
    N.F. Johnson and S. Sajodia, “Steganalysis of images created using current steganography software,” Preliminary Proc. Second International Information Hiding Workshop (1998).Google Scholar
  16. 16.
    D. Karakos and A. Papamarcou, “Some results on the information capacity of authentication channels,” Dept. of Electrical Engineering, University of Maryland, College Park, MD, manuscript, 1997.Google Scholar
  17. 17.
    J. Kilian, F.T. Leighton, L. Matheson, T. Shamoon, R. Tarjan, and F. Zane, “Resistance of digital fingerprints to collusional attacks,” unpublished manuscript (1997).Google Scholar
  18. 18.
    J. Lacy, S.R. Quackenbush, A. Reibman, and J.H. Snyder, “Intellectual property protection systems and digital watermarking,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998).Google Scholar
  19. 19.
    J. P. Linnartz, T. Kalker, and G. Depovere, “Modelling the false alarm and missed detection rate for electronic watermarks,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998)Google Scholar
  20. 20.
    J. P. Linnartz and M. Van Dijk, “Analysis of the sensitivity attack against electronic watermarks in images,” Preliminary Proceedings of the Second International Information Hiding Workshop (1998).Google Scholar
  21. 21.
    M. Maes, “Twin peaks: the histogram attack on fixed depth image watermarks,” Preliminary Proc. Second International Information Hiding Workshop (1998).Google Scholar
  22. 22.
    K.A.Magerlein, G.W. Braudaway, and F.C. Mintzer, “Protecting publicallyavailable images with a visible image watermark,” Proc. SPIE Conf. on Optical Security and Counterfeit Deterrence Techniques, SPIE 2659 (1996), pp. 126–132.Google Scholar
  23. 23.
    J.J.K ó Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” IEE Proc. on Vision, Image and Signal Processing 143 (1996), pp. 250–256.CrossRefGoogle Scholar
  24. 24.
    J.J.K. ó Ruanaidh, W.J. Dowling, and F.M. Boland, “Phase watermarking of digital images,” Proc. IEEE International Conference on Image Processing ICIP-96 (1996), pp. 239–242.Google Scholar
  25. 25.
    J. ó Ruanaidh and T. Pun, “Rotation, translation and scale invariant digital image watermarking,” Proceedings 1997 IEEE International Conference on Image Processing (1997), Vol. I, pp. 536–539.Google Scholar
  26. 26.
    F. Peticolas, R. Anderson, and M. Kuhn, “Attacks on copyright marking systems,” Preliminary Proc. Second International Information Hiding Workshop (1998).Google Scholar
  27. 27.
    B. Pfitzmann and M. Shaunter, “Anonymous fingerprinting, (extended abstract),” EUROCRYPT '96, Lecture Notes in Computer Science 1070, Springer-Verlag, Berlin (1996), pp. 84–95.Google Scholar
  28. 28.
    B. Pfitzmann and M. Waidner, “Asymmetric fingerprinting for larger collusions,” 4th ACM Conf. on Computer and Communications Security (1997), pp. 151–160.Google Scholar
  29. 29.
    B. Pfitzmann and M. Waidner, “Anonymous fingerprinting,” IBM Research Report RZ 2221 (1996).Google Scholar
  30. 30.
    A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “DCT-based watermark recovering without resorting to the uncorrupted original image,” Proceedings 1997 IEEE International Conference on Image Processing (1997) Vol. I, pp. 520–523.Google Scholar
  31. 31.
    C. Podilchuck and W. Zeng, “Digital image watermarking using visual models,” IS&T/SPIE Electronic Imaging 3016 (1997).Google Scholar
  32. 32.
    V. Poor, An Introduction to Signal Detection and Estimation, 2nd Edition, Springer-Verlag, New York, 1994.MATHGoogle Scholar
  33. 33.
    Preliminary Proceedings of the Second International Information Hiding Workshop, 1998.Google Scholar
  34. 34.
    R. van Schyndel, A. Tirkel, and C. Osborne, “A digital watermark,” Proceedings 1994 IEEE International Conference on Image Processing, (1994), pp. 86–90.Google Scholar
  35. 35.
    R. van Schyndel, A. Tirkel, and C. Osborne, “Towards a robust digital watermark,” Proceedings DICTA-95 (1993), pp. 378–385.Google Scholar
  36. 36.
    Y. Sheng and H.H. Arsenault, “Experiments on pattern recognition using invariant Fourier-Mellon descriptors,” J. Optical Society of America A 3 (1986), pp. 771–776.CrossRefGoogle Scholar
  37. 37.
    J.R. Smith and B.O. Comisky, “Modulation and information hiding in images,” Information Hiding, First International Workshop Procedings, R. Anderson, ed., Lecture Notes in Computer Science 1174, Springer-Verlag, Berlin (1996), pp. 207–226.Google Scholar
  38. 38.
    S. Sowers and A. Youssef, “Testing digital watermark resistance to destruction,” Preliminary Proc. Second International Information Hiding Workshop (1998).Google Scholar
  39. 39.
    M.D. Swanson, B. Zhu, and A.A. Tewfik, “Transparent robust image watermarking,” Proc IEEE Int. Conf. On Image Processing, ICIP-96 Vol. 3, (1996) pp. 211–214.Google Scholar
  40. 40.
    M.D. Swanson, B. Zhu, and A.H. Tewfik, “Robust image watermaking using perceptual models,” unpublished manuscipt (1997).Google Scholar
  41. 41.
    M. Swanson, B. Zhu, and A. Tewfik, “Data Hiding for Video in Video,” Proceedings 1997 IEEE International Conference on Image Processing, (1997), Vol II, pp. 676–679.Google Scholar
  42. 42.
    A. Tirkel, G. Rankin, R. van Schyndel, W. Ho, N. Mee, and C Osborne, “Electronic watermark,” Proceedings DICTA-93 (1993), pp. 666–673.Google Scholar
  43. 43.
    N. Wagner, “Fingerprinting,” Proc. 1983 IEEE Symp. on Security and Privacy (1983), pp. 18–22.Google Scholar
  44. 44.
    W. Zeng and B. Liu, “On resolving rightful ownerships of digital images by invisible watermarks,” Proc. IEEE Int. Conf. on Image Processing, ICIP-97 (1997), Vol. I, pp. 552–555.Google Scholar

Copyright information

© Springer-Verlag 1998

Authors and Affiliations

  • Lesley R. Matheson
    • 1
  • Stephen G. Mitchell
    • 1
    • 2
  • Talal G. Shamoon
    • 1
  • Robert E. Tarjan
    • 1
    • 3
  • Francis Zane
    • 1
    • 4
  1. 1.STAR LabInterTrust Technologies CorporationSunnyvale
  2. 2.School of Electrical EngineeringCornell UniversityIthaca
  3. 3.Department of Computer SciencePrinceton UniversityPrinceton
  4. 4.Dept. of Computer ScienceUniversity of California at San DiegoLa Jolla

Personalised recommendations