Dynamic watermarking of images

With the rapid growth of networked multimedia data systems, copyright protection of proprietary digitized media has gained importance. Inserting a robust and invisible signal that clearly identifies the owner or the recipient is beginning to emerge as the solution. Previous research in the field of watermarking has been successful in inserting a 'static' watermark, which endures ownership rights but is not as robust and tamper-proof as the 'dynamic' watermarks. This paper presents a novel invisible and robust watermarking technique that aims at dynamically inserting the watermark in digital images. Dynamic generation of watermark ensures that whenever the image is viewed, the watermark inserted in the image is different from the previous one providing more security against copyright attacks. This is accomplished by bundling the viewer and the image together, in which the viewer is responsible for embedding the new watermark using the spread spectrum watermarking algorithm every time. We have implemented the proposed scheme and present experimental results.

[1]  Rajarathnam Chandramouli,et al.  Multiple-description framework for oblivious watermarking , 2001, IS&T/SPIE Electronic Imaging.

[2]  Lein Harn A public-key based dynamic password scheme , 1991, [Proceedings] 1991 Symposium on Applied Computing.

[3]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[4]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[5]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.

[6]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[7]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[8]  Jessica Fridrich Combining low-frequency and spread-spectrum watermarking , 1998, Optics & Photonics.

[9]  H. J. Beker,et al.  Message Authentication and Dynamic Passwords , 1987, EUROCRYPT.

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[11]  Mohan S. Kankanhalli,et al.  A dual watermarking technique for images , 1999, MULTIMEDIA '99.

[12]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[13]  Wenjun Zeng,et al.  Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[14]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[15]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.