Abstract
This paper presents watermark insertion algorithm applied to spatial domain of an image. It is assumed that a possible forger knows the proposed watermarking technique. The retrieval of watermark is based on the principles of error correcting codes using secure image key and the original image. The scheme could identify a buyer specific signature from the image in the form of a unique buyer key assigned to every copy of the image being sold. The survival of the watermark is demonstrated for a wide range of image transformations and forging attempts both in spatial and frequency domains.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
C. Cachin. An Information-Theoretic Model for Steganography. In 2nd Workshop on Information Hiding, in volume 1525 of Lecture Notes in Computer Science. Springer Verlag, 1998.
I. J. Cox and M. L. Miller. A review of watermaking and the importance of perceptual modeling. In Proceedings of Electronics Imaging, February 1997.
I. J. Cox, J. Kilian, T. Leighton and T. Shamoon. Secure Spread Spectrum Watermaking for Multimedia. IEEE Transactions on Image Processing, 6(12):1673–1687, 1997.
S. Craver, B. Yeo and M. Yeung. Technical Trials and Legal Tribulations. Communication of the ACM July 1998, 41(7), July 1998.
R. C. Gonzalez and P. Wintz. Digital Image Processing. Addison-Wesley Publishing (MA, USA), 1988.
J. R. Hernansez, M. Amadeo and F. P. Gonzalez. DCT-Domain Watermaking Techniques for Still Images: Detector Performance Analysis and a New Structure. IEEE Transactions on Image Processing, 9(1):55–68, 2000.
N. F. Johnson, Z. Duric and S. Jajodia. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers Boston, USA, 2000.
G. C. Langelaar and R. L. Lagendijk. Optimal Differential Energy Watermarking of DCT Encoded Images and Video. IEEE Transactions on Image Processing, 10(1):148–158, 2001.
C. S. Lu, S. K. Huang, C. J. Sze and H. Y. Liao. A NewWatermarking Technique for Multimedia Protection. Multimedia Image and Video Processing. L. Guan, S. Y. Kung and J. Larsen (ed.), pages 507–530, CRC Press (Boca Raton, USA), 2001.
F. J. MacWillams and N. J. A. Sloane. The Theory of Error Correcting Codes. North Holland, 1977.
F. Mintzer, G. W. Braudaway and A. E. Bell. Opportunities for Watermaking Stndards. Communication of the ACM July 1998, 41(7), July 1998.
F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn and D. Aucsmith. Attacks on Copyright Marking Systems. In 2nd Workshop on Information Hiding, pages 218–238 in volume 1525 of Lecture Notes in Computer Science. Springer Verlag, 1998.
J. O. Ruanaidh, H. Petersen, A. Herrigel, S. Pereira and T. Pun. Cryptographic copyright protection for digital images based on watermarking techniques. Theoretical Computer Science 226:117–142, 1999.
M. M. Yeung. Digital Watermaking. Communication of the ACM July 1998, 41(7), July 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maitra, S., Mukherjee, D.P. (2001). Spatial Domain Digital Watermarking with Buyer Authentication. In: Rangan, C.P., Ding, C. (eds) Progress in Cryptology — INDOCRYPT 2001. INDOCRYPT 2001. Lecture Notes in Computer Science, vol 2247. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45311-3_15
Download citation
DOI: https://doi.org/10.1007/3-540-45311-3_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43010-0
Online ISBN: 978-3-540-45311-6
eBook Packages: Springer Book Archive