Digital watermarking of text, image, and video documents

Abstract The ease of reproduction, distribution, and manipulation of digital documents creates problems for authorized parties that wish to prevent illegal use of such documents. To this end, digital watermarking has been proposed as a last line of defense. A digital watermark is an imperceptible, robust, secure message embedded directly into a document. The watermark is imperceptible both perceptually and statistically. Robustness means that the watermark cannot be removed or modified unless the document is altered to the point of no value. The watermark is secure if unauthorized parties cannot erase or modify it. Current watermarking schemes may be viewed as spread-spectrum communications systems, which transmit a message redundantly using a low-amplitude, pseudo-noise carrier signal. An example highlights the basic mechanisms and properties of spread spectrum and their relation to watermarking. Finally, specific issues in watermarking of text, images, and video are discussed, along with watermarking examples.

[1]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[2]  Nasir D. Memon,et al.  On the invertibility of invisible watermarking techniques , 1997, Proceedings of International Conference on Image Processing.

[3]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[4]  Bernd Girod,et al.  Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[5]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[6]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[7]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[8]  Paul G. Flikkema,et al.  Spread-spectrum techniques for wireless communication , 1997, IEEE Signal Process. Mag..

[9]  Peter Eisert,et al.  Digital watermarking of MPEG-4 facial animation parameters , 1998, Comput. Graph..

[10]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[11]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[12]  Fernando Pérez-González,et al.  The impact of channel coding on the performance of spatial watermarking for copyright protection , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[13]  B. Liu,et al.  On resolving rightful ownerships of digital images by invisible watermarks , 1997, Proceedings of International Conference on Image Processing.

[14]  Bernd Girod,et al.  Watermark Detection after Quanization Attacks , 1999, Information Hiding.

[15]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[16]  J. O'Ruanaidh,et al.  Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .

[17]  Ahmed H. Tewfik,et al.  Multiresolution video watermarking using perceptual models and scene segmentation , 1997, Proceedings of International Conference on Image Processing.

[18]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[19]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[20]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[21]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[22]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[23]  Klara Nahrstedt,et al.  Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..

[24]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[25]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.