Skip to main content

A Robust Block Oriented Watermarking Scheme in Spatial Domain

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Included in the following conference series:

Abstract

In this paper we present an invisible spatial domain watermarking technique. The technique divides the image into n small blocks and the intensity of some of these blocks are modified depending on the key, which is a secret random binary string of length m < n. Given an attacked image, the recovery process generates a bit pattern of length m and we show that from this pattern it is possible to get back the exact key using either standard correlation measure or error correcting codes. The recovery process employs window matching technique on the attacked image, which has been found to work successfully. Our method can survive common image transformations and intentional attacks both in spatial and frequency domain. Most importantly, it also survives the nonlinear geometric attacks, e.g., Stirmark. To the best of our knowledge, here we experiment with an exhaustive set of attacks which has not been provided elsewhere.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Bender, D. Gruhl and N. Morimoto. Techniques for Data Hiding. In Proceedings of the SPIE 2420, Storage and Retrieval for Image and Video Databases III, Pages 164–173, 1995.

    Google Scholar 

  2. I. J. Cox and M. L. Miller. A review of watermarking and the importance of perceptual modeling. In Proceedings of Electronics Imaging, February 1997.

    Google Scholar 

  3. I. J. Cox, J. Kilian, T. Leighton and T. Shamoon. Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Proc., 6(12):1673–1687, 1997.

    Article  Google Scholar 

  4. F. Ergun, J. Kilian and R. Kumar. A note on the limits of collusion-resistant watermarks. In Eurocrypt 1999, LNCS, Springer Verlag, 1999.

    Google Scholar 

  5. R. C. Gonzalez and P. Wintz. Digital Image Processing. Addison-Wesley Publishing (MA, USA), 1988.

    Google Scholar 

  6. F. Hartung and M. Kutter. Multimedia watermarking techniques. Proceedings of IEEE, 87(7), July 1999.

    Google Scholar 

  7. J. R. Hernansez, M. Amadeo and F. P. Gonzalez. DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure. IEEE Transactions on Image Processing, 9(1):55–68, 2000.

    Article  Google Scholar 

  8. N. F. Johnson, Z. Duric and S. Jajodia. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers Boston, USA, 2000.

    Google Scholar 

  9. S. Katzenbeisser, F. A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, USA, 2000.

    Google Scholar 

  10. G. C. Langelaar and R. L. Lagendijk. Optimal Differential Energy Watermarking of DCT Encoded Images and Video. IEEE Transactions on Image Processing, 10(1):148–158, 2001.

    Article  MATH  Google Scholar 

  11. C. S. Lu, S. K. Huang, C. J. Sze and H. Y. Liao. A New Watermarking Technique for Multimedia Protection. Multimedia Image and Video Processing. L. Guan, S. Y. Kung and J. Larsen (edited), pages 507–530, CRC Press, 2001.

    Google Scholar 

  12. F. J. MacWillams and N. J. A. Sloane. The Theory of Error Correcting Codes. North Holland, 1977.

    Google Scholar 

  13. F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn and D. Aucsmith. Attacks on Copyright Marking Systems. In 2nd Workshop on Information Hiding, pages 218–238 in volume 1525 of Lecture Notes in Computer Science. Springer Verlag, 1998.

    Chapter  Google Scholar 

  14. F. A. P. Petitcolas and R. J. Anderson. Evaluation of Copyright Marking Systems. In IEEE Multimedia Systems, Florence, Italy, June 1999.

    Google Scholar 

  15. J. O. Ruanaidh, H. Petersen, A. Herrigel, S. Pereira and T. Pun. Cryptographic copyright protection for digital images based on watermarking techniques. Theoretical Computer Science 226:117–142, 1999.

    Article  MATH  Google Scholar 

  16. G. K. Wallace. The JPEG still picture compression standard. Comm. of the ACM, April 1991.

    Google Scholar 

  17. M. M. Yeung. Digital Watermarking. Comm. of the ACM, 41(7), July 1998.

    Google Scholar 

  18. http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/

  19. http://www.jpeg.org/JPEG2000.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Das, T.K., Maitra, S. (2002). A Robust Block Oriented Watermarking Scheme in Spatial Domain. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics