An asymmetric image watermarking scheme resistant against geometrical distortions

In this paper, a novel asymmetric public-key watermarking scheme for static images is proposed. The watermark is embedded with the use of a private key, while the decoding uses only a simple public key. The asymmetric watermark carries certain number of bits of information. However, neither the knowledge of the public key, nor the knowledge of the hidden information, allows the attacker to remove the watermark. That information can be read from an attacked image, in particular from a geometrically transformed image. Moreover, the proposed watermark could be used as a synchronization template for another private-key watermark.

[1]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[2]  Scott Craver Zero Knowledge Watermark Detection , 1999, Information Hiding.

[3]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[4]  Bernd Girod,et al.  Asymmetric Watermarking Schemes , 2000 .

[5]  Dariusz Bogumil Reversing Global and Local Geometrical Distortions in Image Watermarking , 2004, Information Hiding.

[6]  Ralf Steinmetz,et al.  Sicherheit in Mediendaten , 2000, GI Jahrestagung.

[7]  Eckhard Koch,et al.  Digital watermarking: what will it do for me? And what it won't! , 1999, SIGGRAPH '99.

[8]  Taejeong Kim,et al.  Transformed-key asymmetric watermarking system , 2004, IEEE Signal Processing Letters.

[9]  Stefan Katzenbeisser,et al.  Copyright Protection Protocols Based on Asymmetric Watermarking , 2001 .

[10]  Joshua R. Smith,et al.  Developments in Steganography , 1999, Information Hiding.

[11]  T. Furon,et al.  Robustness of asymmetric watermarking technique , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[12]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[13]  Ahmad-Reza Sadeghi,et al.  Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.

[14]  Yong-Gang Fu,et al.  A novel asymmetric watermarking scheme , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[15]  Jean-Jacques Quisquater,et al.  Which directions for asymmetric watermarking? , 2002, 2002 11th European Signal Processing Conference.

[16]  Imants D. Svalbe,et al.  Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[17]  Pierre Duhamel,et al.  An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.

[18]  Bernd Girod,et al.  Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.

[19]  Stefan Katzenbeisser On the Integration of Watermarks and Cryptography , 2003, IWDW.

[20]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[21]  Sviatoslav Voloshynovskiy,et al.  Watermark template attack , 2001, IS&T/SPIE Electronic Imaging.

[22]  F. Bao,et al.  On the security of two public key watermarking schemes , 2003, Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.

[23]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[24]  Stefan Katzenbeisser,et al.  Security analysis of public key watermarking schemes , 2001, SPIE Optics + Photonics.