Digital Watermarking Techniques and Security Issues in the Information and Communication Society

Digital watermarking is the process of embedding information into a noise-tolerant digital signal such as image or audio data. Such information is embedded in a way difficult to be removed in order to easily identify relevant information for many different purposes, such as the copyright ownership of the media, source tracking, piracy deterrence, etc. There is an extensive literature about watermarking algorithms and methods as well as possible attack techniques. In this work we collect a part of this vast literature in order to make easier for a non-expert reader about watermarking to have a high-level overview on new trends and technologies related to multimedia watermark algorithms and attacks.

[1]  Marc Chaumont,et al.  A reversible data hiding method for encrypted images , 2008, Electronic Imaging.

[2]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[3]  Bülent Sankur,et al.  Comparative evaluation of semifragile watermarking algorithms , 2004, J. Electronic Imaging.

[4]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[5]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.

[6]  Stephen Mooney,et al.  Digital Rights Management: Business and Technology , 2001 .

[7]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[8]  Jian Wang,et al.  Perceptually transparent audio watermarking of real audio signals based on the CSPE algorithm , 2010 .

[9]  Hal Berghel,et al.  Watermarking cyberspace , 1997, CACM.

[10]  Francesco Palmieri,et al.  Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.

[11]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[12]  Daniel Gooch,et al.  Communications of the ACM , 2011, XRDS.

[13]  Hirotsugu Kinoshita An image digital signature system with ZKIP for the graph isomorphism , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[14]  I Pitas,et al.  Image watermarking using block site selection and DCT domain constraints. , 1998, Optics express.

[15]  Maha Sharkas,et al.  A Dual Digital-Image Watermarking Technique , 2005, WEC.

[16]  Bijan G. Mobasseri,et al.  Watermarking of MPEG-2 video in compressed domain using VLC mapping , 2005, MM&Sec '05.

[17]  Yuanyu Ding,et al.  A Video Watermarking Algorithm Resistant to Copy Attack , 2010, 2010 Third International Symposium on Electronic Commerce and Security.

[18]  Bernd Girod,et al.  Quantization effects on digital watermarks , 2001, Signal Process..

[19]  Ajay Goel,et al.  A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images , 2011 .

[20]  Francesco Palmieri,et al.  Automatic security assessment for next generation wireless mobile networks , 2011, Mob. Inf. Syst..

[21]  Yoshinao Aoki,et al.  Digital image watermarking by Fresnel transform and its robustness , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).