Skip to main content

Secure Copyright Protection Techniques for Digital Images

  • Conference paper
  • First Online:
Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

This paper presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images is described. The system is based on a new watermarking technique, which is robust against image transformation techniques such as compression, rotation, translation, scaling and cropping. It uses modulation of the magnitude components in Fourier space to embed a watermark and an accompanying template and, during watermark extraction, reads a template in the log polar transform of the frequency domain. The template is used for analyzing scaling and rotation suffered by the watermarked stego-image. The detection of the watermarks is also possible without any need for the original cover-image. In addition, the system applies asymmetric cryptographic protocols for different purposes, namely embedding/detecting the watermark and transferring watermarked data. The public key technique is applied for the construction of a one-way watermark embedding and the verification function to identify and prove the uniqueness of the watermark. Legal dispute resolution is supported for the multiple watermarking of a digital image without revealing the confidential keying information.

All methods, procedures and schemes presented in this paper are based on the European patent application No. 97 810 708.4

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. Cox, J. Killian, T. Leighton and T. Shamoon, โ€œSecure spread spectrum communication for multimediaโ€, Technical report, N.E.C. Research Institute, 1995.

    Google Scholarย 

  2. G. Caronni โ€œAssuring Ownership Rights for Digital Imagesโ€ in H. H. Brueggemann and W. Gerhardt-Haeckl, editors, Reliable IT Systems VISโ€™ 95, Vieweg, Germany, 1995, pp. 251โ€“264.

    Google Scholarย 

  3. W. G. Chambers, โ€œBasics of Communications and Codingโ€, Oxford Science Publications. Clarendon Press Oxford, 1985.

    Google Scholarย 

  4. S. Craver, Memon, B. Yeo and M. Yeung, โ€œCan invisible marks resolve rightful ownerships?โ€, IS&T/SPIE Electronic Imagingโ€™ 97: โ€œStorage and Retrieval of Image and Video Databasesโ€, 1997.

    Google Scholarย 

  5. P. Davern and M. Scott, โ€œFractal based image steganographyโ€, Proc. International Workshop in Information Hiding, LNCS, Springer, 1996, pp. 279โ€“294.

    Chapterย  Google Scholarย 

  6. J.-F. Delaigle, J-M. Boucqueau, J.-J. Quisquater and B. Macq, โ€œDigital Images protection techniques in a broadcast framework: An overviewโ€, Laboratoire de Tรฉlรฉcommunications et de Tรฉlรฉdรฉction, Universitรฉ Catholique de Louvain, 1996.

    Google Scholarย 

  7. A. Freier, P. Karlton and P. Kocher, โ€œSSL Version 3.0โ€, Netscape Communications, Version 3.0, November 1996.

    Google Scholarย 

  8. P. Horster, M. Michels, H. Petersen, โ€˜โ€œMeta signature schemes giving message recovery based on the discrete logarithm problemโ€โ€™, Proc. 2nd Int. Workshop on IT-Security, September, 1994, pp. 82โ€“92.

    Google Scholarย 

  9. ISO/ IEC 11770-3, โ€œInformation technology-Security techniques-Key management, Part 3: Mechanisms using asymmetric techniquesโ€, 1995.

    Google Scholarย 

  10. M.G. Kuhn, โ€œStirMarkโ€, http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/, November 1997.

  11. K. Matsui and K. Tanaka, โ€œVideo-Steganography: How to secretly embed a signature in a pictureโ€, IMA Intellectual Property Project Proceedings, January 1994, pp. 187โ€“206.

    Google Scholarย 

  12. A.J. Menezes, P.C. Van Oorschot and S.A. Vanstone, โ€œHandbook of Applied Cryptographyโ€, CRC Press, 1996.

    Google Scholarย 

  13. K. Nyberg, R. Rueppel, โ€œMessage recovery for signature schemes based on the discrete logarithm problemโ€, LNCS 950, Advances in Cryptology: Proc. Eurocryptโ€™ 94, Springer, (1994), pp. 182โ€“193.

    Chapterย  Google Scholarย 

  14. J. K. รณRuanaidh, W. J. Dowling and F. M. Boland, โ€œPhase watermarking of imagesโ€, IEEE International Conference on Image Processing, September 1996.

    Google Scholarย 

  15. J. J. K. รณRuanaidh, W. J. Dowling and F. M. Boland, โ€œWatermarking digital images for copyright protectionโ€, IEEE Proceedings on Vision, Image and Signal Processing, Vol. 143, No. 4, August 1996, pp. 250โ€“256.

    Articleย  Google Scholarย 

  16. W. B. Pennebaker and J. L. Mitchell, โ€œJPEG Still Image Compression Standardโ€, Van Nostrand Reinhold, New York, 1993.

    Google Scholarย 

  17. W.H. Press, S.A. Teukolsky, W.T. Vetterling and B.P. Flannery, โ€œNumerical Recipes in Cโ€, Cambridge University Press, second edition, 1992.

    Google Scholarย 

  18. J. Smith and B. Comiskey, โ€œModulation and information hiding in imagesโ€, Proc. Workshop in Information Hiding, LNCS 1173, Springer, 1996, pp. 207โ€“226.

    Chapterย  Google Scholarย 

  19. B. Schneier, โ€œApplied Cryptographyโ€, Wiley, 2nd edition, 1995.

    Google Scholarย 

  20. A. Z. Tirkel, G. A. Rankin, R. G. van Schyndel, W. J. Ho, N. R. A. Mee and C. F. Osborne, โ€œElectronic watermarkโ€, Dicta-93, December 1993, pp. 666โ€“672.

    Google Scholarย 

  21. A. Z. Tirkel, R. G. van Schyndel and C. F. Osborne, โ€œa two-dimensional digital watermarkโ€, Proc. ACCVโ€™95, December 1995, pp. 378โ€“383.

    Google Scholarย 

  22. โ€œUnZignโ€, http://www.altern.org/watermark/, 1997.

  23. J. Zhao and E. Koch, โ€œEmbedding robust labels into images for copyright protectionโ€, Technical report, Fraunhofer Institute for Computer Graphics, Darmstadt, Germany, 1994.

    Google Scholarย 

  24. J. Zhao, โ€œA WWW Service To Embed And Prove Digital Copyright Watermarksโ€, Proc. Of the European Conference on Multimedia Application, Services and Techniques, May 1996.

    Google Scholarย 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

ยฉ 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Herrigel, A., Ruanaidh, J.รณ., Petersen, H., Pereira, S., Pun, T. (1998). Secure Copyright Protection Techniques for Digital Images. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics