Watermarking digital image and video data. A state-of-the-art overview

The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

[1]  Jiri Fridrich,et al.  Robust bit extraction from images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[2]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[3]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Jessica J. Fridrich,et al.  Comparing robustness of watermarking techniques , 1999, Electronic Imaging.

[5]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[6]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[7]  G.W. Wornell,et al.  An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[8]  D. Kundur,et al.  A Robust Digital Image Watermarking Scheme Using the Wavelet-Based Fusion , 1997 .

[9]  Adnan M. Alattar Smart Images using Digimarc's watermarking technology , 2000, Electronic Imaging.

[10]  Ahmed H. Tewfik,et al.  Progressive quantized projection watermarking scheme , 1999, MULTIMEDIA '99.

[11]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[12]  Mauro Barni,et al.  Mask building for perceptually hiding frequency embedded watermarks , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[13]  Eckhard Koch,et al.  Copyright Protection for Multimedia Data , 1994 .

[14]  Edward J. Delp,et al.  A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .

[15]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[16]  B. Liu,et al.  On resolving rightful ownerships of digital images by invisible watermarks , 1997, Proceedings of International Conference on Image Processing.

[17]  David J. Fleet,et al.  Embedding invisible information in color images , 1997, Proceedings of International Conference on Image Processing.

[18]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[19]  Gordon W. Braudaway,et al.  Protecting publicly-available images with an invisible image watermark , 1996, Proceedings of International Conference on Image Processing.

[20]  Ioannis Pitas,et al.  Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[21]  Ioannis Pitas,et al.  Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[22]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[23]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[24]  Jean-Paul M. G. Linnartz,et al.  Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[25]  Jeffrey J. Rodríguez,et al.  Improved watermark robustness via spectrum equalization , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[26]  Reginald L. Lagendijk,et al.  Robust labeling methods for copy protection of images , 1997, Electronic Imaging.

[27]  Eckhard Koch,et al.  Copyright labeling of digitized image data , 1998 .

[28]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[29]  Shelby Pereira,et al.  Secure robust digital image watermark , 1998, Other Conferences.

[30]  Bernd Girod,et al.  Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[31]  Ahmed H. Tewfik,et al.  Fraud detection and self embedding , 1999, MULTIMEDIA '99.

[32]  Franck Davoine,et al.  Geometrical and frequential watermarking scheme using similarities , 1999, Electronic Imaging.

[33]  Mauro Barni,et al.  DWT-based technique for spatio-frequency masking of digital signatures , 1999, Electronic Imaging.

[34]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[35]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[36]  Gabriela Csurka,et al.  Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[37]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[38]  Ioannis Pitas,et al.  Embedding parametric digital signatures in images , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[39]  Hirotsugu Kinoshita An image digital signature system with ZKIP for the graph isomorphism , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[40]  Peter M. J. Rongen,et al.  Digital image watermarking by salient point modification: practical results , 1999, Electronic Imaging.

[41]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[42]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[43]  Bo Tao,et al.  Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[44]  Ja-Ling Wu,et al.  Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[45]  Reginald L. Lagendijk,et al.  Watermarking by DCT coefficient removal: a statistical approach to optimal parameter settings , 1999, Electronic Imaging.

[46]  Ioannis Pitas,et al.  Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[47]  Pamela Samuelson,et al.  Digital media and the law , 1991, CACM.

[48]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[49]  Joan Puate,et al.  Using fractal compression scheme to embed a digital signature into an image , 1997, Other Conferences.

[50]  Anil K. Jain,et al.  Image data compression: A review , 1981, Proceedings of the IEEE.

[51]  Michael Scott,et al.  Fractal Based Image Steganography , 1996, Information Hiding.

[52]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[53]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[54]  Bernd Girod,et al.  Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.

[55]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[56]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[57]  Ioannis Pitas,et al.  Digital watermarking: An overview , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[58]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[59]  Lee Ming Cheng,et al.  Selective block assignment approach for robust digital image watermarking , 1999, Electronic Imaging.

[60]  Edward J. Delp,et al.  Overview of image security techniques with applications in multimedia systems , 1998, Other Conferences.

[61]  Thierry Pun,et al.  Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.

[62]  Edward J. Delp,et al.  Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.

[63]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[64]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[65]  Christophe De Vleeschouwer,et al.  Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.

[66]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[67]  Bernd Girod,et al.  Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.

[68]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[69]  Ralf Steinmetz,et al.  Combined video and audio watermarking: embedding content information in multimedia data , 2000, Electronic Imaging.

[70]  Tuomas Aura,et al.  Practical Invisibility in Digital Communication , 1996, Information Hiding.

[71]  Franck Davoine,et al.  Self-similarity based image watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[72]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[73]  Dinu Coltuc,et al.  Watermarking by histogram specification , 1999, Electronic Imaging.

[74]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[75]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[76]  Jean-Paul M. G. Linnartz,et al.  On the reliability of detecting electronic watermarks in digital images , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[77]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[78]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[79]  Frank Bossen,et al.  Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.

[80]  Wenjun Zeng,et al.  Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[81]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[82]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[83]  Reginald L. Lagendijk,et al.  Real-Time Labeling of MPEG-2 Compressed Video , 1998, J. Vis. Commun. Image Represent..

[84]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[85]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[86]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[87]  Fabien A. P. Petitcolas,et al.  Weaknesses of copyright marking systems , 1998 .

[88]  K. Hill A perspective: the role of identifiers in managing and protecting intellectual property in the digital age , 1999 .

[89]  Arnaud E. Jacquin,et al.  Image coding based on a fractal theory of iterated contractive image transformations , 1992, IEEE Trans. Image Process..

[90]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.