Secure spread spectrum watermarking for multimedia

This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

[1]  Ingo Stierand,et al.  Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.

[2]  Peter Grant,et al.  Wideband coding for uncoordinated mulit-ple access communication , 1992 .

[3]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[4]  D. Campana,et al.  Spread-spectrum communications , 1993, IEEE Potentials.

[5]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[6]  Laurence B. Milstein,et al.  Spread-Spectrum Communications , 1983 .

[7]  Lawrence O'Gorman,et al.  Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.

[8]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[9]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[10]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[11]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[12]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[13]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[14]  C. W. Therrien,et al.  Decision, Estimation and Classification: An Introduction to Pattern Recognition and Related Topics , 1989 .

[15]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[16]  Ingemar J. Cox,et al.  Dynamic histogram warping of image pairs for constant image brightness , 1995, Proceedings., International Conference on Image Processing.

[17]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[18]  Allen Gersho,et al.  Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.

[19]  A.K. Jain,et al.  Two-dimensional signal processing , 1980, Proceedings of the IEEE.

[20]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[21]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[22]  Jiri Weiss,et al.  Digital Copyright: Who Owns What?. , 1995 .

[23]  Eckhard Koch,et al.  Copyright Protection for Multimedia Data , 1994 .

[24]  Kineo Matsui,et al.  Information Security and Cryptography. Video Stegonography. , 1995 .

[25]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[26]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[27]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[28]  S. P. Mudur,et al.  Three-dimensional computer vision: a geometric viewpoint , 1993 .

[29]  Albert C. Leighton The Statesman Who Could not Read His Own Mail , 1993, Cryptologia.

[30]  Silvio Micali,et al.  Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.

[31]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[32]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..