Watermarking digital images for copyright protection
Watermarking digital images for copyright protection
- Author(s): J.J.K. Ó Ruanaidh ; W.J. Dowling ; F.M. Boland
- DOI: 10.1049/ip-vis:19960711
For access to this article, please select a purchase option:
Buy article PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): J.J.K. Ó Ruanaidh 1 ; W.J. Dowling 1 ; F.M. Boland 1
-
-
View affiliations
-
Affiliations:
1: Department of Electronic and Electrical Engineering, Trinity College Dublin, Dublin, Ireland
-
Affiliations:
1: Department of Electronic and Electrical Engineering, Trinity College Dublin, Dublin, Ireland
- Source:
Volume 143, Issue 4,
August 1996,
p.
250 – 256
DOI: 10.1049/ip-vis:19960711 , Print ISSN 1350-245X, Online ISSN 1359-7108
A watermark is an invisible mark placed on an image that is designed to identify both the source of an image as well as its intended recipient. The authors present an overview of watermarking techniques and demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour digital images.
Inspec keywords: image coding; transform coding; copyright
Other keywords:
Subjects: Optical information, image and video signal processing; Codes; Computer vision and image processing techniques; Economic, social and political aspects of computing
References
-
-
1)
- W.H. Press , S.A. Teukolsky , W.T. Vetterling , B.P. Flannery . (1996) Numerical recipes in C.
-
2)
- Tirkel, A.Z., van Schyndel, R.G., Osborne, C.F.: `A two-dimensional digital watermark', Proceedings of ACCV, 1995, Singapore.
-
3)
- Matsui, K., Tanaka, K.: `Video-steganography: how to secretly embed a signature in a picture', IMA Intellectual Property Project Proceedings, January 1994, p. 187–206.
-
4)
- R.L. Pickholtz , D.L. Schilling , L.B. Milstein . Theory of spread spectrum communications-a tutorial. IEEE Trans. , 5 , 855 - 884
-
5)
- Zhao, J., Koch, E.: `Embedding robust labels into images for copyright protection', Technical report, 1994.
-
6)
- Tirkel, A.Z., Rankin, G.A., van Schyndel, R.G., Ho, W.J., Mee, N.R.A., Osborne, C.F.: `Electronic water mark', Proceedings of Dicta–93, 1993, p. 666–672.
-
7)
- Burton, D., Fitzgerald, W.J.: `Bayesian parameter estimation: further results', Technical report, 1989.
-
8)
- W.G. Chambers . (1985) Basics of communications and coding.
-
9)
- Brassil, J., Low, S., Maxemchuk, N., O'Gorman, L.: `Electronic marking and identification techniques to discouragedocument copying', Proceedings of INFOCOM 94, 1994.
-
10)
- Kurak, C., McHugh, J.: `A cautionary note on image downgrading', Proceedings 8th Annual Computer Security Applications Conference, 1992, San Antonio.
-
11)
- J.S. Lim . (1990) Two-dimensional signal and image processing.
-
12)
- R.G. Gallager . (1968) Information theory and reliable communication.
-
13)
- P. Sweeney . (1991) Error control coding, an introduction.
-
14)
- van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: `A digital watermark', Proceedings of IEEE International Conference on Image Processing, 1994, Austin, Texas, p. 86–90.
-
15)
- J.G. Proakis . (1995) Digital communications, Series in electrical and computer engineeringcommunications and signalprocessing.
-
16)
- Ó Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: `Phase watermarking of images', IEEE International Conference on Image processing, September 1996, Lausanne, Switzerland.
-
17)
- G. Caronni , H.H. Brueggemann , W. Gerhardt-Haeckl . (1995) Assuring ownership rights for digital images, Reliable IT Systems VIS '95.
-
18)
- Dautzenberg, C., Boland, F.M.: `Watermarking images', Technical report, 1994.
-
19)
- B. Schneier . (1996) Applied cryptography.
-
20)
- Cox, I., Killian, J., Leighton, T., Shamoon, T.: `Secure spread spectrum communication for multimedia', Technical report, 1995, ftp://ftp.nj.nec.com/pub/ingemar/papers/watermark.ps.Z.
-
21)
- A. Papoulis . (1991) Probability, random variables and stochastic processes.
-
22)
- A.V. Oppenheim , J.S. Lim . The importance of phase in signals. Proc. IEEE , 5 , 529 - 541
-
23)
- R.E. Blahut . (1983) The theory and practice of error control codes.
-
24)
- Ó Ruanaidh, J.J.K., Boland, F.M., Sinnen, O.: `Watermarking digital images for copyright protection', Proceedings of the Electronic Imaging and Visual Arts Conference, February 1996, Florence, http://kalman.mee.tcd.ie/people/jjr/eva-pap.html..
-
25)
- van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: `Towards a robust digital watermark', Proceedings of Dicta-95, 1995.
-
26)
- S. Walton . Image authentication for a slippery new age. Dr. Dobb's J. , 4 , 18 - 26, 82–87
-
27)
- E.T. Jaynes , R.D. Rosenkrantz . (1989) Papers on probability, statistics and statistical physics, a reprintcollection.
-
28)
- C.E. Shannon . A mathematical theory of communication. Bell Syst. Tech. J. , 379 - 423, 623–656
-
29)
- G.L. Bretthorst . (1989) Bayesian spectrum analysis and parameter estimation.
-
30)
- K.R. Rao , P. Yip . (1990) The discrete cosine transform: algorithms, advantages, applications.
-
31)
- R.J. Clarke . (1985) Transform coding of images.
-
32)
- W.B. Pennebaker , J.L. Mitchell . (1992) JPEG still image compressionstandard.
-
33)
- S. Haykin . (1994) Communications systems.
-
1)