Image watermarking: an evolution to content based approaches

The paper is focused on the evolution of the watermarking schemes from pixel-based approaches to content based methods. Firstly, the field of watermarking is presented, its implication in the real word is outlined. The second section gives a brief overview of different approaches in the spatial and the frequential domain. We then present different content-based approaches used to improve the invisibility or the synchronisation of the mark. The last section describes our content-based scheme; the synchronisation of the mark after image processing lies in the use of feature point detectors. The image is decomposed into a set of triangles and each triangle is individually marked, (C) 2001 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.

[1]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[3]  Ioannis Pitas,et al.  Chaotic Mixing of Digital Images and Applications to Watermarking , 1996 .

[4]  Franck Davoine,et al.  Self-similarity based image watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[5]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[6]  Ahmed H. Tewfik,et al.  Geometric distortion correction in image watermarking , 2000, Electronic Imaging.

[7]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[8]  Stephen M. Smith,et al.  SUSAN—A New Approach to Low Level Image Processing , 1997, International Journal of Computer Vision.

[9]  Christopher G. Harris,et al.  A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.

[10]  Mauro Barni,et al.  Capacity of the watermark channel: how many bits can be hidden within a digital image? , 1999, Electronic Imaging.

[11]  Jean-François Delaigle,et al.  Improving data hiding by using convolutional codes and soft-decision decoding , 2000, Electronic Imaging.

[12]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[13]  Franck Davoine,et al.  Using the fractal code to watermark images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[14]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[15]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[16]  Erwan Bigorgne,et al.  Un détecteur de points caractéristiques sur des images multispectrales. Extension vers un détecteur sub-pixellique. , 1999 .

[17]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[18]  Edward J. Delp,et al.  A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .

[19]  Martin Kutter,et al.  Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.

[20]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[21]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.

[22]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[23]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[24]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.

[25]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[26]  Franck Davoine,et al.  Geometrical and frequential watermarking scheme using similarities , 1999, Electronic Imaging.

[27]  Benoit M. Macq,et al.  Generalized 2-D cyclic patterns for secret watermark generation , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[28]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[29]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[30]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[31]  Christophe De Vleeschouwer,et al.  Watermarking algorithm based on a human visual model , 1998, Signal Process..

[32]  Q. Sun,et al.  Recovering modified watermarked image with reference to original image , 1999 .

[33]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[34]  Ioannis Pitas,et al.  Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[35]  Min Wu,et al.  Rotation-, scale-, and translation-resilient public watermarking for images , 2000, Electronic Imaging.

[36]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[37]  Dominic J. A. Welsh,et al.  Codes and cryptography , 1988 .

[38]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[39]  I. Pitas,et al.  The use of watermarks in the protection of digital multimedia products , 1999, Proc. IEEE.

[40]  Robert H. Deng,et al.  Recovering modified watermarked images with reference to the original image , 1999, Electronic Imaging.