Multimedia data-embedding and watermarking technologies

We review developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible or invisible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal, e.g., multilingual soundtracks in a movie, or provide copyright protection. We discuss the reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream. We also discuss the issues and problems associated with copy and copyright protection and assess the viability of current watermarking algorithms as a means for protecting copyrighted data.

[1]  Thomas S. Huang,et al.  Image processing , 1971 .

[2]  Thomas L. Marzetta,et al.  Detection, Estimation, and Modulation Theory , 1976 .

[3]  A. Gualtierotti H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  J. M. Foley,et al.  Contrast masking in human vision. , 1980, Journal of the Optical Society of America.

[6]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[7]  조위덕 Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.

[8]  R L Rivest,et al.  Factoring and cryptography. , 1988, Science.

[9]  Bernd Girod,et al.  The Information Theoretical Significance of Spatial and Temporal Masking in Video Signals , 1989, Photonics West - Lasers and Applications in Science and Engineering.

[10]  J. Van Leeuwen,et al.  Handbook of theoretical computer science - Part A: Algorithms and complexity; Part B: Formal models and semantics , 1990 .

[11]  John E. Howland,et al.  Computer graphics , 1990, IEEE Potentials.

[12]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[13]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[14]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[15]  P. Noll,et al.  Wideband speech and audio coding , 1993, IEEE Communications Magazine.

[16]  John C. Russ,et al.  The image processing handbook (3. ed.) , 1995 .

[17]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[18]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[19]  Nicholas F. Maxemchuk,et al.  Electronic document distribution , 1994, AT&T Technical Journal.

[20]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[21]  Bin Zhu,et al.  Low bit rate near-transparent image coding , 1995, Defense, Security, and Sensing.

[22]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[23]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[24]  A. Viterbi CDMA: Principles of Spread Spectrum Communication , 1995 .

[25]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[26]  Lawrence O'Gorman,et al.  Protecting ownership rights through digital watermarking , 1996 .

[27]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[28]  Kineo Matsui,et al.  Embedding a seal into a picture under orthogonal wavelet transform , 1996, Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems.

[29]  Michael Scott,et al.  Fractal Based Image Steganography , 1996, Information Hiding.

[30]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[31]  Ja-Ling Wu,et al.  Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[32]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[33]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[34]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[35]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[36]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[37]  Ioannis Pitas,et al.  Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[38]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[39]  Andrew Calway,et al.  Proceedings of the IEEE International Conference on Image Processing , 1996 .

[40]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[41]  Jonathan N. Bradley,et al.  Data embedding method , 1996, Other Conferences.

[42]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[43]  Jonathan N. Bradley,et al.  The data embedding method , 1996 .

[44]  Michael Luby,et al.  Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.

[45]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[46]  Ahmed H. Tewfik,et al.  Multiresolution video watermarking using perceptual models and scene segmentation , 1997, Proceedings of International Conference on Image Processing.

[47]  Bernd Girod,et al.  Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.

[48]  Ja-Ling Wu,et al.  Digital watermarking for video , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[49]  Bernd Girod,et al.  Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[50]  Christophe De Vleeschouwer,et al.  Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.

[51]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[52]  Frank Bossen,et al.  Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.

[53]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[54]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[55]  Wenjun Zeng,et al.  Digital image watermarking using visual models , 1997, Electronic Imaging.

[56]  Ahmed H. Tewfik,et al.  Object-based transparent video watermarking , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[57]  Joan Puate,et al.  Using fractal compression scheme to embed a digital signature into an image , 1997, Other Conferences.

[58]  Paul G. Flikkema,et al.  Spread-spectrum techniques for wireless communication , 1997, IEEE Signal Process. Mag..

[59]  Wenjun Zeng,et al.  Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[60]  Hiroshi Masuda,et al.  Embedding Data in 3D Models , 1997, IDMS.

[61]  Hiroshi Masuda,et al.  Watermaking three-dimensional polygonal models , 1997, MULTIMEDIA '97.

[62]  M. Yeung,et al.  Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications , 1998, IEEE J. Sel. Areas Commun..

[63]  John F. Tilki Encoding a Hidden Digital Signature onto an Audio Signal Using Psychoacoustic Masking , 1998 .

[64]  Ahmed H. Tewfik,et al.  Robust audio watermarking using perceptual masking , 1998, Signal Process..

[65]  Gerhard C. Langelaar,et al.  Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .

[66]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[67]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[68]  J. van Leeuwen,et al.  Information Hiding , 1999, Lecture Notes in Computer Science.

[69]  京都大学数理解析研究所,et al.  Number Theory and Its Applications , 1999 .