Image watermarking with better resilience

We present schemes for hardening image watermarks against adversarial jamming. Our techniques improve upon standard correlation- and spread spectrum-based methods, and withstand various image distortions and attacks intended to render watermarks unreadable. The watermarking schemes we propose explicitly locate and amplify watermark data remaining after attacks. Key ideas include the embedding of watermarks in specially chosen domains, the application of image enhancement, the computation of responses over watermark subsets, and the use of redundancy and search. For watermark detection, our schemes do not require the original image or any information about it.

[1]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[2]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[3]  Gregory W. Wornell,et al.  Provably robust digital watermarking , 1999, Optics East.

[4]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[5]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[6]  PunThierry,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998 .

[7]  Alan V. Oppenheim,et al.  Discrete-Time Signal Pro-cessing , 1989 .

[8]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[9]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999 .

[10]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[11]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[12]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[13]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[14]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[15]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[16]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[17]  Gregory W. Wornell,et al.  Achievable performance of digital watermarking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[18]  Fernando Pérez-González,et al.  Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..

[19]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.

[20]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..