Region-Based Watermarking by Distribution Adjustment
Watermarking typically involves adding one sequence to another to produce a new sequence containing hidden information. This method is based on modifying a distribution, obtained via segmentation, to hide information, thus allowing subsets of the distribution to still potentially reveal the watermark. We use vector quantization to segment a colour image and then shift each distribution by a random amount. The result is that we can detect a watermark without pre-processing because only comparisons between distributions are needed.
KeywordsOriginal Image Kolmogorov Smirnov Test Watermark Image Vector Quantization Multimedia Content
Unable to display preview. Download preview PDF.
- 1.W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, no. 3&4, 1996.Google Scholar
- 2.G. Brisbane, R. Safavi-Naini, and P. Ogunbona, “Region-based watermarking for images,” in ISW: International Workshop on Information Security, LNCS, 1999.Google Scholar
- 3.D. Coltuc and P. Bolon, “Watermarking by histogram specification,” in Security and Watermarking of Multimedia Contents(P. W. Wong and E. J. Delp, eds.), vol. 3657 of Proceedings of SPIE, pp. 252–263, Society of Photo-optical Instrumentation Engineers (SPIE), 1999.Google Scholar
- 4.W. J. Conover, Practical Nonparametric Statistics. John Wiley and Sons, 1999.Google Scholar
- 5.I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum water-marking for multimedia,” NEC Research Institute, Technical Report 95–10, 1995.Google Scholar
- 6.A. Gersho and R. M. Gray, Vector Quantization and Signal Compression. Kluwer Academic Publishers, 1992.Google Scholar
- 7.M. Kutter, S. Bhattacharjee, and T. Ebrahimi, “Towards second generation wa-termarking schemes,” in Proceedings of the 6th International Conference on Image Processing, vol. 1, pp. 320–323, Oct. 1999.Google Scholar
- 8.M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” in Security and Watermarking of Multimedia Contents (P. W. Wong and E. J. Delp, eds.), vol. 3657, (San Jose, California, U.S.A.), pp. 226–239, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE, 25-27 Jan. 1999.Google Scholar
- 9.C.-Y. Lin, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, “Rotation, scale, and translation resilient public watermarking for images,” in Security and Wa-termarking of Multimedia Contents II (P. W. Wong and E. J. Delp, eds.), vol. 3971 of Proceedings of SPIE, pp. 90–98, Society of Photo-optical Instrumentation Engineers (SPIE), 2000.Google Scholar
- 10.J. J. K. Ó Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, vol. 66, pp. 303–317, May 1998. European Association for Signal Processing (EURASIP).Google Scholar
- 11.F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, pp. 1062–1078, July 1999.Google Scholar
- 12.M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, 1998.Google Scholar