Digital watermarking

Summary form only given. The ability to represent audio and video digitally and its vast popularity poses enormous challenges in protection against unauthorized use, copy and distribution in open, highly uncontrolled Internet environment. Digital watermarking, a technology for insertion of imperceptible information into multimedia content offers a solution for authentication and suitable action thereof. This is a rapidly maturing technology. Initiatives within the industry are ongoing for various forms of multimedia. Technology alone is unlikely to address all the copy protection issues. Business models and legal support also play an important role in tackling them.

[1]  Gordon W. Braudaway,et al.  If one watermark is good, are more better? , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[2]  G.W. Wornell,et al.  An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[3]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[4]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[5]  David Bull,et al.  SPIE - Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA , 2002 .

[6]  Zixiang Xiong,et al.  Multiresolution watermarking for images and video , 1999, IEEE Trans. Circuits Syst. Video Technol..

[7]  Paul Jessop The business case for audio watermarking , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[8]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[9]  Jörg Schwenk,et al.  Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.

[10]  Chris Honsinger Data Embedding Using Phase Dispersion , 2000, PICS.

[11]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[12]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[13]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[14]  Ali N. Akansu,et al.  Information theoretic bounds for data hiding in compressed images , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[15]  Gregory W. Wornell,et al.  Achievable performance of digital watermarking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[16]  Mahalingam Ramkumar,et al.  Theoretical capacity measures for data hiding in compressed images , 1999, Other Conferences.

[17]  Ja-Ling Wu,et al.  A blind watermarking algorithm with semantic meaningful watermarks , 2000, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (Cat. No.00CH37154).

[18]  Andrew G. Glen,et al.  APPL , 2001 .

[19]  Hal Berghel,et al.  Digital watermarking makes its mark , 1998, NTWK.

[20]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[21]  Rajarathnam Chandramouli Data hiding capacity in the presence of an imperfectly known channel , 2001, IS&T/SPIE Electronic Imaging.

[22]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[23]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[24]  Ja-Ling Wu,et al.  Multiresolution watermarking for digital images , 1998 .

[25]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[26]  Ioannis Pitas,et al.  Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[27]  Gregory W. Wornell,et al.  Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[28]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[29]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[30]  Christian S. Collberg,et al.  Software watermarking: models and dynamic embeddings , 1999, POPL '99.

[31]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[32]  Pierre Moulin,et al.  The Data-Hiding Capacity of Image Sources , 2000 .

[33]  Regunathan Radhakrishnan,et al.  On the security of the SARI image authentication system , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[34]  Er-Hsien Fu Literature Survey on Digital Image Watermarking , 2022 .

[35]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[36]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[37]  Ahmed H. Tewfik,et al.  Multiresolution video watermarking using perceptual models and scene segmentation , 1997, Proceedings of International Conference on Image Processing.

[38]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[39]  F. Segal,et al.  A CHARACTERIZATION OF FIBRANT SEGAL CATEGORIES , 2006, math/0603400.

[40]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[41]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[42]  Jessica J. Fridrich,et al.  Comparing robustness of watermarking techniques , 1999, Electronic Imaging.

[43]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[44]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[45]  Rajarathnam Chandramouli Watermarking capacity in the presence of multiple watermarks and a partially known channel , 2001, SPIE ITCom.

[46]  Ja-Ling Wu,et al.  Gradient Original Image After JPEG compression or image processing Gradient magnitude Mean of gradient magnitude Determine amount of hidden watermark bits Intensity image Mean of gradient magnitude , 2002 .