A Role for Digital Watermarking in Electronic Commerce

Digital media are subject to illicit distribution and owners of such data are cautious about making their work available without some method of identifying ownership and copyright. Digital watermarks are employed in an attempt to provide proof of ownership and identify illicit copying and distribution of multimedia information. In this paper we briefly discuss the role of digital watermarking as a means of aiding in copyright and ownership issues. We present an overview of information hiding methods for digital media, propose a new way of categorizing watermark techniques through image modeling, and illustrate an alternative watermarking technique through the use of gradual masks. Attacks on watermarks are then discussed, and we propose a method for watermark recovery after attacks. Also with Information and Software Engineering Department, George Mason University. Also with Computer Science Department, George Mason University.

[1]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[2]  Gordon W. Braudaway,et al.  Protecting publicly-available images with an invisible image watermark , 1996, Proceedings of International Conference on Image Processing.

[3]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[4]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[5]  Warwick Ford,et al.  Secure electronic commerce , 1997 .

[6]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[7]  Oscar Firschein,et al.  Readings in computer vision: issues, problems, principles, and paradigms , 1987 .

[8]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[9]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[10]  Lisa M. Marvel,et al.  Reliable Blind Information Hiding for Images , 1998, Information Hiding.

[11]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[12]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[13]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[14]  G. Stewart Introduction to matrix computations , 1973 .

[15]  Eckhard Koch,et al.  Copyright Protection for Multimedia Data , 1994 .

[16]  Thomas Ertl,et al.  Computer graphics—principles and practice , 1997 .

[17]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[18]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[19]  Walter Bender,et al.  Information Hiding to Foil the Casual Counterfeiter , 1998, Information Hiding.

[20]  Barry J. Shepherd,et al.  Graphics file formats - reference and guide , 1994 .

[21]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[22]  David J. Fleet,et al.  Embedding invisible information in color images , 1997, Proceedings of International Conference on Image Processing.

[23]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[24]  Ja-Ling Wu,et al.  Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[25]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[26]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[27]  Sushil Jajodia,et al.  Recovering Watermarks from Images , 1999 .

[28]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[29]  Azriel Rosenfeld Models: the graphics-vision interface , 1992 .

[30]  Bernd Jähne,et al.  Digital Image Processing: Concepts, Algorithms, and Scientific Applications , 1991 .

[31]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[32]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[33]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[34]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.

[35]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[36]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[37]  Miodrag Potkonjak,et al.  Fingerprinting Digital Circuits on Programmable Hardware , 1998, Information Hiding.

[38]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.