Jointly Verifying Ownership of an Image Using Digital Watermarking

The current image watermarking schemes only involve one key, thus can not resolve the problem of joint ownership. This paper proposes two totally new algorithms that make use of a secret sharing scheme in cryptography to address this problem. The first one applies Shamir's (2,2) threshold scheme to the watermarking algorithm. A watermark, which is a gaussian distributed random vector determined by two keys, is embedded to selected coefficients in all middle bands in the wavelet domain of an image, so that only when the two keys are put together can the ownership be verified. The second algorithm is a modification of the first one. Three random watermarks are embedded to middle bands in the wavelet domain of an image. For the watermark detection, two thresholds are set, so the watermark detector can verify partial ownership as well as full ownership. Experimental results show that both algorithms have the desired properties such as invisibility, reliable detection and robustness against a wide range of imaging processing operations.

[1]  Jennifer Seberry,et al.  Reusing Shares in Secret Sharing Schemes , 1994, Comput. J..

[2]  Min Wu,et al.  Multi-level data hiding for digital image and video , 1999, Optics East.

[3]  Shih-Kun Huang,et al.  Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..

[4]  Ja-Ling Wu,et al.  Multiresolution watermarking for digital images , 1998 .

[5]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[6]  Jiri Fridrich,et al.  Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.

[7]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..

[8]  Gregory W. Wornell,et al.  Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..

[9]  Ramiro Jordan,et al.  On digital image watermarking robust to geometric transformations , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[10]  Joan Puate,et al.  Using fractal compression scheme to embed a digital signature into an image , 1997, Other Conferences.

[11]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[12]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[13]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[14]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[15]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[16]  Zixiang Xiong,et al.  Multiresolution watermarking for images and video , 1999, IEEE Trans. Circuits Syst. Video Technol..

[17]  Bernd Girod,et al.  Quantization effects on digital watermarks , 2001, Signal Process..

[18]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[19]  Thierry Pun,et al.  Content adaptive watermarking based on a stochastic multiresolution image modeling , 2000, 2000 10th European Signal Processing Conference.

[20]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[21]  Min Wu,et al.  Rotation-, scale-, and translation-resilient public watermarking for images , 2000, Electronic Imaging.

[22]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[23]  Keith M. Martin,et al.  Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract) , 1995, EUROCRYPT.

[24]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[25]  Gordon W. Braudaway,et al.  Opportunities for watermarking standards , 1998, CACM.

[26]  Nicolas D. Georganas,et al.  Digital image watermarking for joint ownership , 2002, MULTIMEDIA '02.

[27]  Thomas S. Huang,et al.  An image watermarking technique using pyramid transform , 2001, MULTIMEDIA '01.

[28]  Narendra Ahuja,et al.  A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[29]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[30]  Ingemar J. Cox,et al.  Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[31]  Ingemar J. Cox,et al.  8 – Robust Watermarking , 2002 .

[32]  Adi Shamir,et al.  How to share a secret , 1979, CACM.