A Review of of Watermarking Principles and Practices

A digital watermark embeds an imperceptible signal into data such as audio, video and images, for a variety of purposes, including captioning and copyright control. As watermarking is increasingly used for a wide variety ∗Portions of this paper appeared in the Proceedings of SPIE, Human Vision & Electronic Imaging II, V 3016, pp 92-99, February 1997. Portions are reprinted, with permission, from “Public watermarks and resistance to tampering”, I.J. Cox and J.-P. Linnartz, IEEE International Conference on Image Processing, CD-ROM Proc. c ©1997 IEEE and from “Some General Methods for Tampering with Watermarks”, I. J. Cox and J.-P. Linnartz, IEEE Trans. on Selected Areas of Communications, 16, 4, 587-593, c ©1998

[1]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[2]  Ton Kalker Watermark Estimation through Detector Observations , 1998 .

[3]  Ioannis Pitas,et al.  Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[5]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.

[6]  Jean-Paul M. G. Linnartz,et al.  Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.

[7]  Eckhard Koch,et al.  Copyright Protection for Multimedia Data , 1994 .

[8]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[9]  Lawrence O'Gorman,et al.  Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.

[10]  Awj Werner Oomen,et al.  A Variable-Bit-Rate Buried-Data Channel for Compact Disc , 1995 .

[11]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[12]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[13]  Fernando Pérez-González,et al.  Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..

[14]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[15]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[16]  David Kahn,et al.  The History of Steganography , 1996, Information Hiding.

[17]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[18]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[19]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[20]  Ja-Ling Wu,et al.  Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[21]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[22]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[23]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[24]  Jean-Paul M. G. Linnartz,et al.  Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[25]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[26]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[27]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[28]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[29]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[30]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[31]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).