Circular interpretation of bijective transformations in lossless watermarking for media asset management

The need for reversible or lossless watermarking methods has been highlighted in the literature to associate subliminal management information with losslessly processed media and to enable their authentication. The paper first analyzes the specificity and the application scope of lossless watermarking methods. It explains why early attempts to achieve reversibility are not satisfactory. They are restricted to well-chosen images, strictly lossless context and/or suffer from annoying visual artifacts. Circular interpretation of bijective transformations is proposed to implement a method that fulfills all quality and functionality requirements of lossless watermarking. Results of several bench tests demonstrate the validity of the approach.

[1]  J. H. Peters,et al.  Reversible intraframe compression of medical images. , 1988, IEEE transactions on medical imaging.

[2]  M.J. Weinberger,et al.  Lossless compression of continuous-tone images , 2000, Proceedings of the IEEE.

[3]  Jeffrey B. Lotspiech,et al.  Safeguarding Digital Library Contents and Users: Digital Watermarking , 1997, D Lib Mag..

[4]  A. Tirkel,et al.  Electronic water mark , 1993 .

[5]  Daniel Augot,et al.  Secure delivery of images over open networks , 1999 .

[6]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[7]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[8]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[9]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[10]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.

[11]  Michael G. Strintzis,et al.  Lossless image compression based on optimal prediction, adaptive lifting, and conditional arithmetic coding , 2001, IEEE Trans. Image Process..

[12]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[13]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[14]  Benoit M. Macq,et al.  Lossless multiresolution transform for image authenticating watermarking , 2000, 2000 10th European Signal Processing Conference.

[15]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[16]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[17]  R. Collorec,et al.  Relevance of watermarking in medical imaging , 2000, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technol.