Region-Based Watermarking by Distribution Adjustment

  • Gareth Brisbane
  • Rei Safavi-Naini
  • Philip Ogunbona
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1975)


Watermarking typically involves adding one sequence to another to produce a new sequence containing hidden information. This method is based on modifying a distribution, obtained via segmentation, to hide information, thus allowing subsets of the distribution to still potentially reveal the watermark. We use vector quantization to segment a colour image and then shift each distribution by a random amount. The result is that we can detect a watermark without pre-processing because only comparisons between distributions are needed.


Original Image Kolmogorov Smirnov Test Watermark Image Vector Quantization Multimedia Content 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, no. 3&4, 1996.Google Scholar
  2. 2.
    G. Brisbane, R. Safavi-Naini, and P. Ogunbona, “Region-based watermarking for images,” in ISW: International Workshop on Information Security, LNCS, 1999.Google Scholar
  3. 3.
    D. Coltuc and P. Bolon, “Watermarking by histogram specification,” in Security and Watermarking of Multimedia Contents(P. W. Wong and E. J. Delp, eds.), vol. 3657 of Proceedings of SPIE, pp. 252–263, Society of Photo-optical Instrumentation Engineers (SPIE), 1999.Google Scholar
  4. 4.
    W. J. Conover, Practical Nonparametric Statistics. John Wiley and Sons, 1999.Google Scholar
  5. 5.
    I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum water-marking for multimedia,” NEC Research Institute, Technical Report 95–10, 1995.Google Scholar
  6. 6.
    A. Gersho and R. M. Gray, Vector Quantization and Signal Compression. Kluwer Academic Publishers, 1992.Google Scholar
  7. 7.
    M. Kutter, S. Bhattacharjee, and T. Ebrahimi, “Towards second generation wa-termarking schemes,” in Proceedings of the 6th International Conference on Image Processing, vol. 1, pp. 320–323, Oct. 1999.Google Scholar
  8. 8.
    M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” in Security and Watermarking of Multimedia Contents (P. W. Wong and E. J. Delp, eds.), vol. 3657, (San Jose, California, U.S.A.), pp. 226–239, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE, 25-27 Jan. 1999.Google Scholar
  9. 9.
    C.-Y. Lin, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, “Rotation, scale, and translation resilient public watermarking for images,” in Security and Wa-termarking of Multimedia Contents II (P. W. Wong and E. J. Delp, eds.), vol. 3971 of Proceedings of SPIE, pp. 90–98, Society of Photo-optical Instrumentation Engineers (SPIE), 2000.Google Scholar
  10. 10.
    J. J. K. Ó Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, vol. 66, pp. 303–317, May 1998. European Association for Signal Processing (EURASIP).Google Scholar
  11. 11.
    F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, pp. 1062–1078, July 1999.Google Scholar
  12. 12.
    M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Gareth Brisbane
    • 1
  • Rei Safavi-Naini
    • 1
  • Philip Ogunbona
    • 2
  1. 1.School of IT and CSUniversity of WollongongWollongongAustralia
  2. 2.Digital Technology Research LabMotorola Australian Research CentreWollongongAustralia

Personalised recommendations