Digital image watermarking for joint ownership

Though many image watermarking schemes have been proposed, none of them can resolve the problem of joint ownership. This paper proposes two novel algorithms that make use of a secret sharing scheme in cryptography to address this problem. The first one applies Shamir's (2, 2) threshold scheme to the watermarking algorithm. A watermark, which is a gaussian distributed random vector determined by two keys, is embedded to selected coefficients in all middle bands in the wavelet domain of an image, so that only when the two keys are put together can the ownership be verified. The second algorithm is a modification of the first one. Three random watermarks are embedded to middle bands in the wavelet domain of an image. For the watermark detection, two thresholds are set, so the watermark detector can verify partial ownership as well as full ownership. Experimental results show that both algorithms have the desired properties such as invisibility, reliable detection and robustness against a wide range of imaging processing operations.

[1]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[2]  Ramiro Jordan,et al.  On digital image watermarking robust to geometric transformations , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[3]  Joan Puate,et al.  Using fractal compression scheme to embed a digital signature into an image , 1997, Other Conferences.

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  Chuen-Ching Wang,et al.  Repeating Image Watermarking Technique by the Visual Cryptography , 2000 .

[6]  Min Wu,et al.  Rotation-, scale-, and translation-resilient public watermarking for images , 2000, Electronic Imaging.

[7]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[9]  Min Wu,et al.  Multi-level data hiding for digital image and video , 1999, Optics East.

[10]  Thierry Pun,et al.  Content adaptive watermarking based on a stochastic multiresolution image modeling , 2000, 2000 10th European Signal Processing Conference.

[11]  Tadao Kasami,et al.  A secure code for recipient watermarking against conspiracy attacks by all users , 1997, ICICS.

[12]  Ingemar J. Cox,et al.  Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[13]  Thomas S. Huang,et al.  An image watermarking technique using pyramid transform , 2001, MULTIMEDIA '01.

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Norishige Morimoto Techniques for data hiding in audio files , 1995 .

[16]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..

[17]  Gregory W. Wornell,et al.  Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..

[18]  Zixiang Xiong,et al.  Multiresolution watermarking for images and video , 1999, IEEE Trans. Circuits Syst. Video Technol..

[19]  Shih-Kun Huang,et al.  Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..

[20]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[21]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[22]  Narendra Ahuja,et al.  A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[23]  Jennifer Seberry,et al.  Reusing Shares in Secret Sharing Schemes , 1994, Comput. J..

[24]  Bernd Girod,et al.  Quantization effects on digital watermarks , 2001, Signal Process..

[25]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[26]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[27]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..