Introduction au tatouage d’images

RésuméCet article introduit la notion de tatouage en sécurité d’images et détaille la forme de tatouage la plus étudiée, à savoir: invisible et robuste pour la protection des droits d’auteur, plus connue sous le mot clé “watermarking”. Les critères à considérer sont précisés pour construire un tatoueur performant en termes de compromis ratio, visibilité et robustesse. Le besoin ou non de recourir à des informations originales pour extraire la marque est également discuté. Plusieurs algorithmes sont détaillés, et on introduit les notions de base fréquemment utilisées. Cet article précise, en outre, les limites actuelles du tatouage.AbstractIn this paper, we introduce the concept of digital watermarking in the field of image security. We describe in detail the most popular form of watermarking, that is to say: invisible and robust for the copyright. We deal with the criteria required to build an efficient watermarking scheme in terms of ratio, visibility and robustness. The necessity or not of using original information to recover the watermark is also addressed. We then present some algorithms, and introduce basic key techniques frequently used. We conclude this article by indicating the current limits of watermarking.

[1]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[2]  Stefan Winkler,et al.  A perceptual distortion metric for digital color images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[3]  Mauro Barni,et al.  Mask building for perceptually hiding frequency embedded watermarks , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[4]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[5]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[6]  C.-C. Jay Kuo,et al.  Image protection via watermarking on perceptually significant wavelet coefficients , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[7]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[8]  Bernd Girod,et al.  Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[9]  Mauro Barni,et al.  Capacity of the watermark channel: how many bits can be hidden within a digital image? , 1999, Electronic Imaging.

[10]  Arnaud E. Jacquin,et al.  Image coding based on a fractal theory of iterated contractive image transformations , 1992, IEEE Trans. Image Process..

[11]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[12]  P. Yip,et al.  Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .

[13]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[14]  J. Bibb Cain,et al.  Error-Correction Coding for Digital Communications , 1981 .

[15]  Fabien A. P. Petitcolas,et al.  Weaknesses of copyright marking systems , 1998 .

[16]  Jelena Kovacevic,et al.  Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.

[17]  Jean-Francois Delaigle,et al.  A Block Based Watermarking Technique for MPEG2 Signals: Optimization and Validation on Real Digital TV Distribution Links , 1998, ECMAST.

[18]  E. Polidori Zooming using iterated function systems , 1997 .

[19]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[20]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..

[21]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[22]  Martin Kutter,et al.  Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.

[23]  J. O'Ruanaidh,et al.  Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .

[24]  Christophe De Vleeschouwer,et al.  Watermarking algorithm based on a human visual model , 1998, Signal Process..

[25]  Jean-Luc Dugelay,et al.  Multi-resolution access control algorithm based on fractal coding , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[26]  Christophe De Vleeschouwer,et al.  Psychovisual approach to digital picture watermarking , 1998, J. Electronic Imaging.

[27]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[28]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[29]  Jean-Paul M. G. Linnartz,et al.  Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[30]  Fernando Pérez-González,et al.  The impact of channel coding on the performance of spatial watermarking for copyright protection , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[31]  X G Xia,et al.  Wavelet transform based watermark for digital images. , 1998, Optics express.

[32]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[33]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[34]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[35]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[36]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[37]  Reginald L. Lagendijk,et al.  Robust labeling methods for copy protection of images , 1997, Electronic Imaging.

[38]  Minerva M. Yeung,et al.  Effective and ineffective digital watermarks , 1997, Proceedings of International Conference on Image Processing.

[39]  Frank Bossen,et al.  Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.

[40]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[41]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[42]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[43]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.