Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Watermarking digital images for copyright protection

Watermarking digital images for copyright protection

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IEE Proceedings - Vision, Image and Signal Processing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A watermark is an invisible mark placed on an image that is designed to identify both the source of an image as well as its intended recipient. The authors present an overview of watermarking techniques and demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour digital images.

References

    1. 1)
      • W.H. Press , S.A. Teukolsky , W.T. Vetterling , B.P. Flannery . (1996) Numerical recipes in C.
    2. 2)
      • Tirkel, A.Z., van Schyndel, R.G., Osborne, C.F.: `A two-dimensional digital watermark', Proceedings of ACCV, 1995, Singapore.
    3. 3)
      • Matsui, K., Tanaka, K.: `Video-steganography: how to secretly embed a signature in a picture', IMA Intellectual Property Project Proceedings, January 1994, p. 187–206.
    4. 4)
      • R.L. Pickholtz , D.L. Schilling , L.B. Milstein . Theory of spread spectrum communications-a tutorial. IEEE Trans. , 5 , 855 - 884
    5. 5)
      • Zhao, J., Koch, E.: `Embedding robust labels into images for copyright protection', Technical report, 1994.
    6. 6)
      • Tirkel, A.Z., Rankin, G.A., van Schyndel, R.G., Ho, W.J., Mee, N.R.A., Osborne, C.F.: `Electronic water mark', Proceedings of Dicta–93, 1993, p. 666–672.
    7. 7)
      • Burton, D., Fitzgerald, W.J.: `Bayesian parameter estimation: further results', Technical report, 1989.
    8. 8)
      • W.G. Chambers . (1985) Basics of communications and coding.
    9. 9)
      • Brassil, J., Low, S., Maxemchuk, N., O'Gorman, L.: `Electronic marking and identification techniques to discouragedocument copying', Proceedings of INFOCOM 94, 1994.
    10. 10)
      • Kurak, C., McHugh, J.: `A cautionary note on image downgrading', Proceedings 8th Annual Computer Security Applications Conference, 1992, San Antonio.
    11. 11)
      • J.S. Lim . (1990) Two-dimensional signal and image processing.
    12. 12)
      • R.G. Gallager . (1968) Information theory and reliable communication.
    13. 13)
      • P. Sweeney . (1991) Error control coding, an introduction.
    14. 14)
      • van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: `A digital watermark', Proceedings of IEEE International Conference on Image Processing, 1994, Austin, Texas, p. 86–90.
    15. 15)
      • J.G. Proakis . (1995) Digital communications, Series in electrical and computer engineeringcommunications and signalprocessing.
    16. 16)
      • Ó Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: `Phase watermarking of images', IEEE International Conference on Image processing, September 1996, Lausanne, Switzerland.
    17. 17)
      • G. Caronni , H.H. Brueggemann , W. Gerhardt-Haeckl . (1995) Assuring ownership rights for digital images, Reliable IT Systems VIS '95.
    18. 18)
      • Dautzenberg, C., Boland, F.M.: `Watermarking images', Technical report, 1994.
    19. 19)
      • B. Schneier . (1996) Applied cryptography.
    20. 20)
      • Cox, I., Killian, J., Leighton, T., Shamoon, T.: `Secure spread spectrum communication for multimedia', Technical report, 1995, ftp://ftp.nj.nec.com/pub/ingemar/papers/watermark.ps.Z.
    21. 21)
      • A. Papoulis . (1991) Probability, random variables and stochastic processes.
    22. 22)
      • A.V. Oppenheim , J.S. Lim . The importance of phase in signals. Proc. IEEE , 5 , 529 - 541
    23. 23)
      • R.E. Blahut . (1983) The theory and practice of error control codes.
    24. 24)
      • Ó Ruanaidh, J.J.K., Boland, F.M., Sinnen, O.: `Watermarking digital images for copyright protection', Proceedings of the Electronic Imaging and Visual Arts Conference, February 1996, Florence, http://kalman.mee.tcd.ie/people/jjr/eva-pap.html..
    25. 25)
      • van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: `Towards a robust digital watermark', Proceedings of Dicta-95, 1995.
    26. 26)
      • S. Walton . Image authentication for a slippery new age. Dr. Dobb's J. , 4 , 18 - 26, 82–87
    27. 27)
      • E.T. Jaynes , R.D. Rosenkrantz . (1989) Papers on probability, statistics and statistical physics, a reprintcollection.
    28. 28)
      • C.E. Shannon . A mathematical theory of communication. Bell Syst. Tech. J. , 379 - 423, 623–656
    29. 29)
      • G.L. Bretthorst . (1989) Bayesian spectrum analysis and parameter estimation.
    30. 30)
      • K.R. Rao , P. Yip . (1990) The discrete cosine transform: algorithms, advantages, applications.
    31. 31)
      • R.J. Clarke . (1985) Transform coding of images.
    32. 32)
      • W.B. Pennebaker , J.L. Mitchell . (1992) JPEG still image compressionstandard.
    33. 33)
      • S. Haykin . (1994) Communications systems.
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-vis_19960711
Loading

Related content

content/journals/10.1049/ip-vis_19960711
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address