Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator.

We describe an electro-optical method of deciphering a watermark from a recently invented encoded image termed a concealogram. The watermark is revealed as a result of spatial correlation between two concealograms, one containing the watermark and the other containing the deciphering key. The two are placed side by side on the input plane of a modified joint-transform correlator. When the input plane is illuminated by a plane wave, the watermark image is reconstructed on part of the correlator's output plane. The key function deciphers the concealed watermark from the visible picture only when the two specific concealograms are matched. To illustrate the system's performance, both simulation and experimental results are presented.

[1]  A. B. Vander Lugt,et al.  Signal detection by complex spatial filtering , 1964, IEEE Trans. Inf. Theory.

[2]  O. Bryngdahl,et al.  VI - Digital Halftoning: Synthesis of Binary Images , 1994 .

[3]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[4]  Derrick Grover Data Watermarking: Steganography and Watermarking of Digital Data , 2001, Comput. Law Secur. Rev..

[5]  J. Goodman,et al.  A technique for optically convolving two functions. , 1966, Applied optics.

[6]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[7]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[8]  A W Lohmann,et al.  Binary fraunhofer holograms, generated by computer. , 1967, Applied optics.

[9]  Bahram Javidi,et al.  Concealogram: an image within an image , 2002, SPIE Optics + Photonics.

[10]  G. C. Langelaar,et al.  Watermarking digital image and video data , 2000 .

[11]  Bahram Javidi,et al.  Security optical systems based on a joint transform correlator with significant output images , 2001, Optical Engineering.

[12]  Bahram Javidi,et al.  3D object watermarking by a 3D hidden object. , 2003, Optics express.

[13]  J Rosen,et al.  Hidden images in halftone pictures. , 2001, Applied optics.

[14]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.