Definition
Digital watermarking techniques are based on information hiding techniques similar to steganographic approaches with the overall goal to embed information into a cover signal, usually multi media data.
The term digital watermarking was used for the first time by [1], actually written in two words: “water mark.” Instead of a confidential or hidden communication, watermarking addresses the security aspects of data and user authentication or data integrity protection, where a digital watermark is a perceptually transparent pattern inserted in digital data using an embedding algorithm and an embedding key. A detection algorithm using the appropriate detection key can retrieve the watermark information. In most approaches the embedding and detection keys are secret, see more details in [2] or [3] (Fig 1).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
C.F. Osborne, R.G. van Schyndel, and A.Z. Tirkel, “A Digital Watermark,” IEEE International Conference on Image Processing, Austin, Texas, pp. 86–90, November 1994.
M. Cox and B. Miller, “Digital Watermarking,” Academic Press, San Diego, USA, ISBN 1-55860-714-5, 2002.
F.A.P. Petticolas and S. Katzenbeisser, “Information Hiding Techniques for Steganography and Digital Watermarking,” Artech House Computer Security Series, 2000.
J. Dittmann, P. Wohlmacher, and K. Nahrstedt, “Multimedia and Security – Using Cryptographic and Watermarking Algorithms,” IEEE Multimedia, Vol. 8, No. 4, 2001, pp. 54–65.
A. Macq, J. Dittmann, and E.J. Delp, “Benchmarking of Image Watermarking Algorithms for Digital Rights Management,” Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management, Vol. 92, No. 6, June 2004, pp. 971–984.
G. Fridrich et al., “Invertile Authentication,” In: P.W. Wong and E.J. Delp III (Eds.) “Security and Watermarking of Multimedia Contents III,” Proceedings of SPIE, Vol. 4314, 2001, pp. 197–208.
S. Katzenbeisser and J. Dittmann, “Malicious attacks on media authentication schemes based on invertible watermarks,” Proceedings of E.J. Delp III, P.W. Wong (Eds.): Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE, Vol. 5306, pp. 838–847, Electronic Imaging Science and Technologies, San Jose, California, January 2004.
M. Kutter, S. Voloshynovskiy, and A. Herrigel, “Watermark Copy Attack,” Proceedings of SPIE: Security and Watermarking of Multimedia Contents II, San Jose, California, USA, Vol. 3971, January 2000, pp. 371–381.
F.A.P. Petitcolas, M. Steinebach, J. Dittmann, C. Fontaine, F. Raynal, and N. Fatès, “A public automated web-based evaluation service for watermarking schemes: StirMark Benchmark,” in P.W. Wong, E.J. Delp III (Eds.) Security and Watermarking of Multimedia Contents III, Proceedings of SPIE, Vol. 4314, 2001, pp. 575–584.
A. Lang, J. Dittmann, E. Lin, E.J. Delp III, “Application-oriented audio watermark benchmark service,” Proceedings of E.J. Delp III, P.W. Wong (Eds.): Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE, Vol. 5681, pp. 275–286, Electronic Imaging Science and Technologies, San Jose, California, USA, January 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag
About this entry
Cite this entry
Steinebach, M., Dittmann, J., Neuhold, E. (2008). Digital Watermarking. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-78414-4_303
Download citation
DOI: https://doi.org/10.1007/978-0-387-78414-4_303
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-74724-8
Online ISBN: 978-0-387-78414-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering