SciELO - Scientific Electronic Library Online

 
vol.12 número1Shuffled Frog-Leaping Algorithm for Control of Selective and Total Harmonic DistortionControl System Development for a Raman Spectrometer Using Microcontroller Technology índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Indicadores

Links relacionados

  • No hay artículos similaresSimilares en SciELO

Compartir


Journal of applied research and technology

versión On-line ISSN 2448-6736versión impresa ISSN 1665-6423

J. appl. res. technol vol.12 no.1 Ciudad de México feb. 2014

 

Robust Image Watermarking Theories and Techniques: A Review

 

Hai Tao*1, Li Chongmin*2, Jasni Mohamad Zain1, Ahmed N. Abdalla3

 

1 Faculty of Computer System and Software Engineering, University Malaysia Pahang, Malaysia.

2 Department of mathematics and information, Qinghai Normal University, China.

3 Faculty of Electrical and Electronic Engineering, University Malaysia Pahang, Malaysia.

 

Abstract

Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect the copyright of digital contents by storing, transmitting and processing information encoded in systems where digital content can easily be disseminated through communication channels? Today it is understood that the answer is yes. This paper reviews the theoretical analysis and performance investigation of representative watermarking systems in transform domains and geometric invariant regions. Digital watermarking is a technology of embedding watermark with intellectual property rights into images, videos, audios, and other multimedia data by a certain algorithm. The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. Moreover, it is concluded that various attacks operators are used for the assessment of watermarking systems, which supplies an automated and fair analysis of substantial watermarking methods for chosen application areas.

Keywords: watermarking, robust, attacks, security.

 

DESCARGAR ARTÍCULO EN FORMATO PDF

 

References

[1] Alghoniemy M. and Tewfik A.H., 2000. Geometric distortion correction in image watermarking. Proc. SPIE Security and Watermarking of Multimedia Contents II , 3971:82-89.         [ Links ]

[2] Alghoniemy M. and Tewfik A.H., 2000. Geometric distortion correction through image normalization. Proc. IEEE Int. Conf. Multimedia and Expo. 3:1291-1294.         [ Links ]

[3] Alghoniemy M. and Tewfik A.H., 2006. Progressive quantized projection approach to data hiding. IEEE Transactions on Image Processing, 15(2):459-472.         [ Links ]

[4] Alvarez R.M. and Perez G.F. 2002. Analysis of pilot-based synchronization algorithms for watermarking of still images. Signal Processing: Image Communication. 17(8): 611-633.         [ Links ]

[5] Andreas L., and Jana D., 2006. Profiles for Evaluation - the Usage of Audio WET. SPIE conference, at the Security, Steganography, and Watermarking of Multimedia Contents VIII, IS&T/SPIE Symposium on Electronic Imaging.         [ Links ]

[6] Barni M., 2005. Effectiveness of exhaustive search and template matching against watermark desynchronization. IEEE Signal Process. Lett. 12(2):158-161.         [ Links ]

[7] Bas P., Chassery J.M., and Macq B., 2002. Geometrically invariant watermarking using feature point. IEEE Transactions on Image Processing, 11(9):1014-1028.         [ Links ]

[8] Cayre F., Fontaine C. and Furon T., 2005. Watermarking security, part I: theory, In: Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE. 5681.

[9] Cayre F., Fontaine C. and Furon T., 2005. Watermarking security, part II: practice, In: Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE. 5681.

[10] Checkmark Benchmarking, http://watermarking.unige.ch/Checkmark/, 2006        [ Links ]

[11] Christian K., Jana D., Andreas L., 2006. Transparency benchmarking on audio watermarks and steganography, SPIE conference, at the Security, Steganography, and Watermarking of Multimedia Contents VIII, IS&T/SPIE Symposium on Electronic Imaging.         [ Links ]

[12] Coltuc D. and Bolon P., 1999. Robust watermarking by histogram specification. Proc. IEEE Int. Conf. Image Processing. 2:236-239.         [ Links ]

[13] Cox I.J. and Linnartz J.P.M.G.,1998. Some general methods for tampering with watermarks. IEEE J. Selected Areas Communi., 16(4)587-593.         [ Links ]

[14] Cox I.J., Miller M.L., and Bloom J. A. 2001. Digital Watermarking. San Francisco, CA: Morgan Kaufman.         [ Links ]

[15] Cox I., Miller M., Bloom J., Fridrich J., and Kalker T., Digital Watermarking and Steganography, 2007. Multimedia Information and Systems. 142-143.         [ Links ]

[16] Cox I.J. and Miller M.L. 1997. A review of watermarking and the importance of perceptual modeling. Proc. SPIE Electronic Imaging '97, Storage and Retrieval for Image and Video Databases.

[17] Cox, I.J. 1996. Secure spread spectrum watermarking for images, audio and video. International Conference on Image Processing, 234-246.         [ Links ]

[18] Cox, I.J., Kilian J., Leighton, F.T., and Shamoon, T.,1997. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673-1678.         [ Links ]

[19] Craver S., Memon N., Yeo B.L., Yeung M.M., 1997. Can invisible watermark resolve rightful ownerships? Fifth Conference on Storage and Retrieval for Image and Video Database. 3022:310-321.         [ Links ]

[20] Deguillaume F., Csurka G., Pun T., 2000. Countermeasures for unintentional and intentional video watermarking attacks. IS&T/SPIE Electronic Imaging.         [ Links ]

[21] Delannay D. and Macq B., 2000. Generalized 2D Cyclic Patterns for Secret Watermark Generation. Proc. IEEE Int'l Conf. Image Processing, 2:72-79.         [ Links ]

[22] Deng C., Gao X., Li X. and Tao D., 2009. A local Tchebichef moments-based robust image watermarking. Signal Process., 89( 8):1531-1539.         [ Links ]

[23] Dong P. and Galatsanos N., 2002. Affine transformation resistant watermarking based on image normalization. Proceedings of International Conference on Image Processing, 3:489 - 492.         [ Links ]

[24] Elbasi, E. (2012). Robust MPEG Watermarking in DWT Four Bands. Journal of Applied Research and Technology, 10(2).         [ Links ]

[25] Herrigel A., Voloshynovskiy S., and Rytsar Y., 2001. The watermark template attack. Proceedings of SPIE: Security and Watermarking of Multimedia Contents III, 394-405.         [ Links ]

[26] Holliman M., Memon N., Yeung M., 1999. Watermark estimation through local pixel correlation. IS&T/SPIE Electronic Imaging'99, Session: Security and Watermarking of Multimedia Contents,134-146.         [ Links ]

[27] Kalker T., 2001. Considerations on watermarking security. Proceedings of the IEEE Multimedia Signal Processing MMSP01 workshop, 201-206.         [ Links ]

[28] Kim T. Y., Choi H., Lee K., and T. Kim 2004. An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark. IEEE Signal Processing Tellers, 2:375-377.         [ Links ]

[29] Kutter M., 1999. Watermarking Resisting to Translation, Rotation, and Scaling. Proc. SPIE Multimedia Systems and Applications. 3528:423-431.         [ Links ]

[30] Kutter M., Bhattacharjee S.K., Ebrahimi T., 1999.Toward second generation watermarking schemes. Proceedings of the IEEE International Conference Image Processing, 1:320-323.         [ Links ]

[31] Kutter M., Jordan F., and Bossen F., 1998. Digital watermarking of color images using amplitude modulation. J. Electron. Imag. 7(2):326-332.         [ Links ]

[32] Langelaar G.C., Lagendijk R.L., Biemond J., 1998. Removing spatial spread spectrum watermarks by nonlinear filtering. Proceedings of the European Signal Processing Conference.

[33] Lee H.Y., Kim H., Lee H.K., 2006. Robust image watermarking using local invariant features, Opt. Eng. 45 (3):1-11        [ Links ]

[34] Bao P, Ma X., 2005. Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans. Circuits Syst. Video Technol. 15(1): 96-102        [ Links ]

[35] Li L.D., and Guo B.L., 2007. Localized image watermarking in spatial domain resistant to geometric attacks, Int. J. Electron. Commun. (AEU), 63:123-131.         [ Links ]

[36] Lichtenauer J., Setyawan I., Kalker T., and Lagendijk R., 2003. Exhaustive geometrical search and the false positive watermark detection probability. Proc. SPIE Security and Watermarking of Multimedia Contents. 5(2):203-214.         [ Links ]

[37] Licks V. and Jordan R., 2005. Geometric attacks on image watermarking systems. IEEE Multimedia Magazine,12(3):68-78.         [ Links ]

[38] Lin C.Y., Wu M., Bloom J.A., Cox I.J., Miller M.L., and Lui Y. M., 2000. Rotation, scale, and translation-resilient public watermarking for images. Proc. SPIE— Security and Watermarking of Multimedia Contents II, 3971:90-98.         [ Links ]

[39] Lin F. and Brandt R.D., 1993. Towards absolute invariants of images under translation, rotation and dilatation. Pattern Recognit. Lett., 14(5):369-379.         [ Links ]

[40] Lu C.S., Huang S.K., Sze C.J. and Mark Liao H.Y. 2000. Cocktail watermarking for digital image protection. IEEE Trans. Multimedia, 2(4):209-224.         [ Links ]

[41] Lu W., Lu H.T., Chung F.L., 2006. Feature based watermarking using watermark template match. Appl. Math Comput. 177(1):377-86.         [ Links ]

[42] Luis P.F., Pedro C. and Fernando P., 2005. Information- Theoretic Analysis of Security in Side-Informed Data Hiding, Information Hiding, 131-145.         [ Links ]

[43] Macq, B., Dittmann, J., Delp, E.J., 2004. Benchmarking of Image Watermarking Algorithms for Digital Rights Management, Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management, 92(6): 971-984.         [ Links ]

[44] Matthew R. 1989. One the derivation of a chaotic encryption algorithm. Cryptologia 8 (1): 29-42.         [ Links ]

[45] Merhav,N. 2005. An information-theoretic view ofwatermark embedding-detection and geometric attacks. Proceedings of WaCha 05.         [ Links ]

[46] Mikolajczyk K., Schmid C., 2002. An affine invariant interest point detector. Proceedings of European Conference on Computer Vision, 2350:128-142.         [ Links ]

[47] Mikolajczyk, K. 2002. Interest point detection invariant to affine transformations. PhD thesis, Institut National Polytechnique de Grenoble.         [ Links ]

[48] Mikolajczyk, K. and Schmid, C. 2002. An affine invariant interest point detector. In Proceedings of the 7th European Conference on Computer Vision, 1:128-142.         [ Links ]

[49] Molina, J.P., Higuera, A.P., Prieto, J.P., & Sandoval, R. (2006). Airborne high-resolution digital imaging system. Journal of Applied Research and Technology, (001), 3-23.         [ Links ]

[50] Moulin P., and O'Sullivan J., 1999. Information-theoretic analysis of information hiding. IEEE Inform. Theory, preprint, 49(3): 563-593.         [ Links ]

[51] Optimark http://poseidon.csd.auth.gr/optimark/, 2006 Pereira S. and Pun T., 2000. Robust template matching for affine resistant image watermarks. IEEE Trans. Image Processing, 9:1123-1129.         [ Links ]

[52] Perrig A., 1997. A copyright protection environment for digital images, Diploma Dissertation, Ecole Polytechnique Federal de Lausanne, Lausanne, Switzerland.         [ Links ]

[53] Petitcolas F.,1999. http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/, in: Stirmark3.0 (60).

[54] Petitcolas F.A.P. and Anderson R.J., 1998. Attacks on copyright marking systems. Second International Information Hiding Workshop, 219-239.         [ Links ]

[55] Petitcolas F.A.P., Anderson R.J., and Kuhn M.G., 1999. Information hiding—A survey. Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062-1078        [ Links ]

[56] Petitcolas F.A.P., Steinebach M., Raynal F., Dittmann J., Fontaine C., Fates N., 2001. Public automated web-based evaluation service for watermarking schemes: StirMark Benchmark. Security and Watermarking of Multimedia Contents III, Proceedings of SPIE 4314:575-584.         [ Links ]

[57] Petitcolas, F., Anderson R.J., Kuhn M.G., 1999. Information Hiding: A survey. Proceedings of the IEEE (special issue) 87(7):1062-1078.         [ Links ]

[58] Pitas I., 1996. A method for signature casting on digital images. Proceedings of the IEEE International Conference on Image, 215-218.         [ Links ]

[59] Prado-Molina, J., Peralta-Higuera, A., Palacio-Prieto, J.L., & Sandoval, R. (2010). Airborne high-resolution digital imaging system. Journal of Applied Research and Technology, 4(01).         [ Links ]

[60] Ruanaidh J.J.K. 6 and Pun T., 1998. Rotation, scale and translation invariant digital image watermarking. Signal Process., 66(3):303-317.         [ Links ]

[61] Seo J.S. and Yoo C.D., 2004. Localized image watermarking based on feature points of scale-space representation. Pattern Recognition, 37(7):1365-1375.         [ Links ]

[62] Seo J.S. and Yoo C.D., 2006. Image watermarking based on invariant regions of scale-space representation, IEEE Trans. Signal Process., 54(4):1537-1549.         [ Links ]

[63] Solachidis V. and Pitas I., 2000. Self-similar ring shaped watermark embedding in 2-D DFT domain. Proc. Eur. Signal Processing Conf.         [ Links ]

[64] Stankovic S., Djurovic I., and Pitas I., 2001. Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution. IEEE Trans. Image Processing. 10:650-658.         [ Links ]

[65] Stir Mark Benchmark, http://www.petitcolas.net/fabien/watermarking/stirmark/, 2006.         [ Links ]

[66] Su J., and Girod B., 1999. Power-spectrun condition for energy-efficient watermarking, IEEE ICIP-99.         [ Links ]

[67] Taboada, B., Larralde, P., Brito, T., Vega-Alvarado, L., Diaz, R., Galindo, E., & Corkidi, G. (2009). Images acquisition of multiphase dispersions in fermentation processes. Journal of Applied Research and Technology, 1(01).         [ Links ]

[68] Takahashi A., Nishimura R., and Suzuki Y. 2005. Multiple watermarks for stereo audio signals using phase-modulation techniques. IEEE Transactions on Signal Processing, 53:806-815.         [ Links ]

[69] Tang C.W. and Hang H.M., 2003. A feature-based robust digital image watermarking scheme. IEEE Trans. Signal Process., 51(4):950-959.         [ Links ]

[70] Tao B. and Dickinson B., 1996. Adaptive watermarking in the DCT domain. Proc. Int. Conf. Image Processing, 4:2985-2988.         [ Links ]

[71] Voloshynovskiy S., 2001.Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks. IEEE Communications Magazine. 39(8):118-126.         [ Links ]

[72] Vukmirovic, S., Erdeljan, A., Imre, L., & Capko, D. (2012). Optimal Workflow Scheduling in Critical Infrastructure Systems with Neural Networks. Journal of Applied Research and Technology, 10(2).         [ Links ]

[73] Yu Y., Lu Z., Ling H., 2006. A robust blind image watermarking scheme based on feature points and RS-invariant domain. Proceedings of the Seventh International Conference on Signal Processing, 1270-1273.         [ Links ]

[74] Yuan W., Ling H., Lu Z., Yu Y., 2006. Image content-based watermarking resistant against geometrical distortions. Proceedings of the Eighth International Conference on Signal Processing, 2632-2635.         [ Links ]

[75] Zheng D., Liu Y., and Zhao J., 2007. A survey of RST invariant image watermarking algorithms. ACM Comput. Surv., 39(2):1-91.         [ Links ]

[76] Pereira S. and Pun T., 2000. Robust template matching for affine resistant image watermarks. IEEE Trans. Image Processing, 9:1123-1129.         [ Links ]

[77] Kurak C., McHugh J., 1992. A cautionary note on image downgrading. Proceedings of the IEEE 8th Annual Computer Security Applications Conference, 153-159.         [ Links ]

[78] Pitas I., 1996. A method for signature casting on digital images. Proceedings of the IEEE International Conference on Image, 215-218.         [ Links ]

[79] Zhang, Q., Li, Y., & Wei, X. (2012). An Improved Robust and Adaptive Watermarking Algorithm Based on DCT. Journal Of Applied Research And Technology, 10(3), 405-415.         [ Links ]

[80] Cruz-Ramos, C., Reyes-Reyes, R., Nakano-Miyatake, M., & Perez-Meana, H. (2010). A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression. Journal of applied research and technology, 8(3), 323-337.         [ Links ]

[81] Elbasi, E. (2012). Robust MPEG Watermarking in dWt Four Bands. Journal of Applied Research and Technology, 10(2).         [ Links ]

[82] Cedillo-Hernandez, M., Nakano-Miyatake, G., Garcia-Ugalde, F., & Perez-Meana, H. (2013). Cropping Resilient Watermarking Based on Histogram Modification. JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY,11, 764-779.         [ Links ]

[83] Liang, H.Y., Cheng, C.H., Yang, C.Y., & Zhang, K.F. (2013). A Blind Data Hiding Technique with Error Correction Abilities and a High Embedding Payload. Journal of Applied Research and Technology, 11, 259-271.         [ Links ]

Creative Commons License Todo el contenido de esta revista, excepto dónde está identificado, está bajo una Licencia Creative Commons