Invisible watermarking for image verification

In this paper we propose a new method for invisibly wa- termarking high-quality color and gray-scale images. This method is intended for use in image verification applications to determine whether the content of an image has been altered, due perhaps, to the act of a malicious party. It consists of both a watermarking pro- cess which stamps a watermark into a source image without visual degradation, and a watermark extraction process which extracts a watermark from a stamped image. The extracted watermark can be compared with the embedded watermark to determine whether the image has been altered. The processing used in the watermarking and watermark extraction processes will be presented in this paper. In addition, we shall describe some modifications that provide better security, and an adaptation of the scheme to watermark JPEG im- ages. Experimental results are reported. Some advantages of this technique over other invisible watermarking techniques for verifica- tion will be discussed; these include a high degree of invisibility, color preservation, ease of extraction, and a high degree of protec- tion against the retention of a correct watermark after alteration by a malicious party. © 1998 SPIE and IS&T. (S1017-9909(98)00903-9)

[1]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[2]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[3]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[4]  Minerva M. Yeung,et al.  Effective and ineffective digital watermarks , 1997, Proceedings of International Conference on Image Processing.

[5]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[6]  Jack C. Lee,et al.  Toward on-line, worldwide access to Vatican Library materials , 1996, IBM J. Res. Dev..

[7]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[8]  William J. Mitchell,et al.  When is Seeing Believing , 1994 .

[9]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  C. M. Place,et al.  An Introduction to Dynamical Systems , 1990 .

[11]  Ioannis Pitas,et al.  Chaotic Mixing of Digital Images and Applications to Watermarking , 1996 .

[12]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[13]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[14]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.