Skip to main content

2017 | OriginalPaper | Buchkapitel

Digital Watermarking: A Potential Solution for Multimedia Authentication

verfasst von : Kaiser J. Giri, Rumaan Bashir

Erschienen in: Intelligent Techniques in Signal Processing for Multimedia Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The digitization has resulted in knowledge explosion in the modern technology-driven world and has led to the encouragement and motivation for digitization of the intellectual artifact. The combining, replication, and distribution facility of the digital media such as text, images, audio, and video easier and faster has no doubt revolutionized the world. However, the unauthorized use and maldistribution of information by online pirates is the sole threat that refrains the information proprietors to share their digital property. It is therefore imperative to come up with standard means to protect the intellectual property rights (IRP) of the multimedia data, thereby developing the effective multimedia authentication techniques to discourage the illegitimate distribution of information content. Digital watermarking, which is believed to be the potential means among the various possible approaches, to encourage the content providers to secure their digital property while maintaining its availability, has been entreated as a potential mechanism to protect IRP of multimedia contents.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Singh N, Sharma D (2015) A review on watermarking & image encoding. Int J Comput Sci Mobile Comput 4(6):632–636MathSciNet Singh N, Sharma D (2015) A review on watermarking & image encoding. Int J Comput Sci Mobile Comput 4(6):632–636MathSciNet
2.
Zurück zum Zitat Giri KJ, Peer MA, Nagabhushan P (2014) A channel wise color image watermarking scheme based on discrete wavelet transformation. In: Proceedings of IEEE international conference on computing for sustainable global environment trans, pp 758–762 Giri KJ, Peer MA, Nagabhushan P (2014) A channel wise color image watermarking scheme based on discrete wavelet transformation. In: Proceedings of IEEE international conference on computing for sustainable global environment trans, pp 758–762
3.
Zurück zum Zitat Nin J, Ricciardi S (2013) Digital watermarking techniques and security issues in the information and communication society. In: International conference on advanced information networking and applications, pp 1553–1558 Nin J, Ricciardi S (2013) Digital watermarking techniques and security issues in the information and communication society. In: International conference on advanced information networking and applications, pp 1553–1558
4.
Zurück zum Zitat Sequeira A, Kundur D (2001) Communications and information theory in watermarking: a survey. In: Proceedings of SPIE multimedia systems and application IV, vol 4518, pp 216–227 Sequeira A, Kundur D (2001) Communications and information theory in watermarking: a survey. In: Proceedings of SPIE multimedia systems and application IV, vol 4518, pp 216–227
5.
Zurück zum Zitat Cox IJ, Miller ML (2001) Electronic watermarking. In: IEEE fourth workshop on multimedia signal processing, pp 225–230 Cox IJ, Miller ML (2001) Electronic watermarking. In: IEEE fourth workshop on multimedia signal processing, pp 225–230
6.
Zurück zum Zitat Cox IJ, Miller ML, Bloom JA, Friedrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufman, San Francisco Cox IJ, Miller ML, Bloom JA, Friedrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufman, San Francisco
7.
Zurück zum Zitat Schyndel RGV, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proceedings of IEEE international conference on image processing, vol 2, pp 86–90 Schyndel RGV, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proceedings of IEEE international conference on image processing, vol 2, pp 86–90
8.
Zurück zum Zitat Tirkel AZ, Rankin GA, Van Schyndel RM, Ho WJ, Mee NRA, Osborne CF (1993) Electronic water mark. DICTA, Macquarie University, pp 666–673 Tirkel AZ, Rankin GA, Van Schyndel RM, Ho WJ, Mee NRA, Osborne CF (1993) Electronic water mark. DICTA, Macquarie University, pp 666–673
9.
Zurück zum Zitat Kaiser J, Giri M, Nagabhushan P (2015) A robust color image watermarking scheme using discrete wavelet transformation. Int J Image Graph Signal Process 1:47–52 Kaiser J, Giri M, Nagabhushan P (2015) A robust color image watermarking scheme using discrete wavelet transformation. Int J Image Graph Signal Process 1:47–52
10.
Zurück zum Zitat Giri KJ, Peer MA, Nagabhushan P (2013) Copyrirght protection of color images using novel wavelet based watermarking algorithm. In: Press: 2nd IEEE international conference on image information processing, JUIT, Shimla, India Giri KJ, Peer MA, Nagabhushan P (2013) Copyrirght protection of color images using novel wavelet based watermarking algorithm. In: Press: 2nd IEEE international conference on image information processing, JUIT, Shimla, India
11.
Zurück zum Zitat Kutter M, Petitcolas F (1999) A fair benchmark for image watermarking systems. In: Electronic imaging 199: security and watermarking of multimedia content, vol 3657 of SPIE Proceedings, San Jose, California USA, 25–27 January 1999 Kutter M, Petitcolas F (1999) A fair benchmark for image watermarking systems. In: Electronic imaging 199: security and watermarking of multimedia content, vol 3657 of SPIE Proceedings, San Jose, California USA, 25–27 January 1999
12.
Zurück zum Zitat Jithin VM, Gupta KK (2013) Robust invisible QR code image watermarking in DWT domain. Int J Electron Commun Eng Technol (IJECET) 4(7):190–195 Jithin VM, Gupta KK (2013) Robust invisible QR code image watermarking in DWT domain. Int J Electron Commun Eng Technol (IJECET) 4(7):190–195
13.
Zurück zum Zitat Zhao M, Dang Y (2008) Color image copyright protection digital watermarking algorithm based on DWT & DCT. IEEE, pp 1–4 Zhao M, Dang Y (2008) Color image copyright protection digital watermarking algorithm based on DWT & DCT. IEEE, pp 1–4
14.
Zurück zum Zitat Anuradha RPS (2006) DWT based watermarking algorithm using haar wavelet. Int J Electron Comput Sci Eng 1:1–6 Anuradha RPS (2006) DWT based watermarking algorithm using haar wavelet. Int J Electron Comput Sci Eng 1:1–6
15.
Zurück zum Zitat Zhang Y, Wang J, Chen X (2012) Watermarking technique based on wavelet transform for color images. In: 24th Chinese Control and Decision Conference (CCDC), pp 1909–1913 Zhang Y, Wang J, Chen X (2012) Watermarking technique based on wavelet transform for color images. In: 24th Chinese Control and Decision Conference (CCDC), pp 1909–1913
16.
Zurück zum Zitat Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: 2012 World Congress on Information and Communication Technologies (WICT). IEEE, pp 230–235 Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: 2012 World Congress on Information and Communication Technologies (WICT). IEEE, pp 230–235
17.
Zurück zum Zitat Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7):33CrossRef Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7):33CrossRef
18.
Zurück zum Zitat Dey N, Das P, Chaudhuri SS, Das A (2012) Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. In: Proceedings of the fifth international conference on security of information and networks. ACM, pp 87–94 Dey N, Das P, Chaudhuri SS, Das A (2012) Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. In: Proceedings of the fifth international conference on security of information and networks. ACM, pp 87–94
19.
Zurück zum Zitat Dey N, Biswas D, Roy AB, Das A, Chaudhuri SS (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA). IEEE, pp 680–685 Dey N, Biswas D, Roy AB, Das A, Chaudhuri SS (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA). IEEE, pp 680–685
20.
Zurück zum Zitat Dey N, Roy AB, Das A, Chaudhuri SS (2012) Stationary wavelet transformation based self-recovery of blind-watermark from electrocardiogram signal in wireless telecardiology. In: Recent trends in computer networks and distributed systems security. Springer, Berlin, pp 347–357 Dey N, Roy AB, Das A, Chaudhuri SS (2012) Stationary wavelet transformation based self-recovery of blind-watermark from electrocardiogram signal in wireless telecardiology. In: Recent trends in computer networks and distributed systems security. Springer, Berlin, pp 347–357
21.
Zurück zum Zitat Khalifa A, Hamad S (2012) A robust non-blind algorithm for watermarking color images using multi-resolution wavelet decomposition. Int J Comput Appl 37(8):0975–8887 Khalifa A, Hamad S (2012) A robust non-blind algorithm for watermarking color images using multi-resolution wavelet decomposition. Int J Comput Appl 37(8):0975–8887
22.
Zurück zum Zitat Elbasi E, Eskicioglu AM (2006) A semi-blind watermarking scheme for color images. Int J Technol Eng Syst (IJTES) 2(3):276–281 Elbasi E, Eskicioglu AM (2006) A semi-blind watermarking scheme for color images. Int J Technol Eng Syst (IJTES) 2(3):276–281
23.
Zurück zum Zitat Craver S, Memon N, Yeo B, Young M (1997) On the invertibility of invisible watermarking techniques. In: Proceedings of the IEEE International Conference on Image Processing, vol 1, pp 540–543 Craver S, Memon N, Yeo B, Young M (1997) On the invertibility of invisible watermarking techniques. In: Proceedings of the IEEE International Conference on Image Processing, vol 1, pp 540–543
24.
Zurück zum Zitat Hua Y, Wu B, Wu G (2010) A color image fragile watermarking algorithm based on DWT-DCT. In: Chinese control and decision conference, pp 2840–2845 Hua Y, Wu B, Wu G (2010) A color image fragile watermarking algorithm based on DWT-DCT. In: Chinese control and decision conference, pp 2840–2845
25.
Zurück zum Zitat Hartung F, Girod B (1997) Digital watermarking of raw and compressed video. In: Proceedings of SPIE 2952: digital compression technologies and systems for video communication, pp 205–213 Hartung F, Girod B (1997) Digital watermarking of raw and compressed video. In: Proceedings of SPIE 2952: digital compression technologies and systems for video communication, pp 205–213
26.
Zurück zum Zitat Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66:283–301CrossRefMATH Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66:283–301CrossRefMATH
27.
Zurück zum Zitat Chavan SK, Shah R, Poojary R, Jose J, George G (2010) A novel robust colour watermarking scheme for colour watermark images in frequency domain. In: International conference on advances in recent technologies in communication and computing, pp 96–100 Chavan SK, Shah R, Poojary R, Jose J, George G (2010) A novel robust colour watermarking scheme for colour watermark images in frequency domain. In: International conference on advances in recent technologies in communication and computing, pp 96–100
28.
Zurück zum Zitat Brassil J, Low S, Maxemchuk N, O’Gorman L (1994) Electronic marking and identification techniques to discourse document copying. Proc INFOCOM 13(8):1495–1504 Brassil J, Low S, Maxemchuk N, O’Gorman L (1994) Electronic marking and identification techniques to discourse document copying. Proc INFOCOM 13(8):1495–1504
29.
Zurück zum Zitat Langelaar GC, Lagendijk RL, Biemond J (1998) Real-time labeling of MPEG-2 compressed video. J Vis Commun Image Represent 9(4):256–270CrossRef Langelaar GC, Lagendijk RL, Biemond J (1998) Real-time labeling of MPEG-2 compressed video. J Vis Commun Image Represent 9(4):256–270CrossRef
30.
Zurück zum Zitat Dey N, Dey M, Mahata SK, Das A, Chaudhuri SS (2015) Tamper detection of electrocardiographic signal using watermarked bio–hash code in wireless cardiology. Int J Signal Imaging Syst Eng 8(1–2):46–58CrossRef Dey N, Dey M, Mahata SK, Das A, Chaudhuri SS (2015) Tamper detection of electrocardiographic signal using watermarked bio–hash code in wireless cardiology. Int J Signal Imaging Syst Eng 8(1–2):46–58CrossRef
31.
Zurück zum Zitat Friedman G (1993) The trustworthy digital camera. IEEE Trans Consum Electron 39(4):93–103CrossRef Friedman G (1993) The trustworthy digital camera. IEEE Trans Consum Electron 39(4):93–103CrossRef
32.
Zurück zum Zitat Cox IJ, Miller M, Bloom J (2001) Digital watermarking: principles and practice. Morgan Kaufmann 10:1558607145 Cox IJ, Miller M, Bloom J (2001) Digital watermarking: principles and practice. Morgan Kaufmann 10:1558607145
33.
Zurück zum Zitat Wolfgang RB, Delp EJ (1999) Fragile watermarking using the VW2D watermark. Proc Electron Imaging 3657:204–213 Wolfgang RB, Delp EJ (1999) Fragile watermarking using the VW2D watermark. Proc Electron Imaging 3657:204–213
34.
Zurück zum Zitat Anderson RJ, Petitcolas FAP (1998) On the limits of Steganography. IEEE J Sel Areas Commun 16:474–481CrossRef Anderson RJ, Petitcolas FAP (1998) On the limits of Steganography. IEEE J Sel Areas Commun 16:474–481CrossRef
35.
Zurück zum Zitat Brassil J, Low S, Maxemchuk N, O’Gorman L (1995) Hiding information in document images. In: Proceedings of the 29th annual conference on information sciences and systems, pp 482–489 Brassil J, Low S, Maxemchuk N, O’Gorman L (1995) Hiding information in document images. In: Proceedings of the 29th annual conference on information sciences and systems, pp 482–489
36.
Zurück zum Zitat Dey N, Biswas S, Roy AB, Das A, Chowdhuri SS (2013) Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology Dey N, Biswas S, Roy AB, Das A, Chowdhuri SS (2013) Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology
37.
Zurück zum Zitat Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS). IEEE, pp 624–627 Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS). IEEE, pp 624–627
38.
Zurück zum Zitat Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 105–110 Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 105–110
39.
Zurück zum Zitat Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. arXiv preprint arXiv:1304.2310 Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. arXiv preprint arXiv:​1304.​2310
40.
Zurück zum Zitat Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authentication using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2(3):749–757 Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authentication using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2(3):749–757
41.
Zurück zum Zitat Liu K-C (2009) Human visual system based watermarking for color images. In: Fifth international conference on information assurance and security, vol 2, pp 623–626 Liu K-C (2009) Human visual system based watermarking for color images. In: Fifth international conference on information assurance and security, vol 2, pp 623–626
42.
Zurück zum Zitat Qiang S, Hongbin Z (2010) Color image self-embedding and watermarking based on DWT. In: International conference on measuring technology and mechatronics automation, vol 1, pp 796–799 Qiang S, Hongbin Z (2010) Color image self-embedding and watermarking based on DWT. In: International conference on measuring technology and mechatronics automation, vol 1, pp 796–799
43.
Zurück zum Zitat Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394CrossRef Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394CrossRef
44.
Zurück zum Zitat Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326CrossRef Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326CrossRef
45.
Zurück zum Zitat Acharjee S, Chakraborty S, Samanta S, Azar AT, Hassanien AE, Dey N (2014) Highly secured multilayered motion vector watermarking. In: advanced machine learning technologies and applications. Springer, Berlin, pp 121–134 Acharjee S, Chakraborty S, Samanta S, Azar AT, Hassanien AE, Dey N (2014) Highly secured multilayered motion vector watermarking. In: advanced machine learning technologies and applications. Springer, Berlin, pp 121–134
46.
Zurück zum Zitat Dey, N., Das, P., Roy, A. B., Das, A., &Chaudhuri, S. S. (2012, October). DWT-DCT-SVD based intravascular ultrasound video watermarking. In Information and Communication Technologies (WICT), 2012 World Congress on (pp. 224–229). IEEE Dey, N., Das, P., Roy, A. B., Das, A., &Chaudhuri, S. S. (2012, October). DWT-DCT-SVD based intravascular ultrasound video watermarking. In Information and Communication Technologies (WICT), 2012 World Congress on (pp. 224–229). IEEE
47.
Zurück zum Zitat Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri, SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6 Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri, SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6
48.
Zurück zum Zitat Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: towards a second generation watermarking benchmark. In: Signal processing, Special Issue on Information Theoretic Issues in Digital Watermarking Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: towards a second generation watermarking benchmark. In: Signal processing, Special Issue on Information Theoretic Issues in Digital Watermarking
49.
Zurück zum Zitat Hartung F, Su JK, Girod B (1999) Spread spectrum watermarking: malicious attacks and counter-attacks. In: Proceedings of SPIE vol 3657: security and watermarking of multimedia contents, San Jose, CA, USA Hartung F, Su JK, Girod B (1999) Spread spectrum watermarking: malicious attacks and counter-attacks. In: Proceedings of SPIE vol 3657: security and watermarking of multimedia contents, San Jose, CA, USA
50.
Zurück zum Zitat Kutter M, Voloshynovskiy S, Herrigel A (2000) Watermark copy attack. In: Wong PW, Delp EJ (eds) IS&T/SPIE’s 12th annual symposium, electronic imaging 2000: security and watermarking of multimedia content II, vol 3971 of SPIE Proceedings, San Jose, California USA, 23–28 January 2000 Kutter M, Voloshynovskiy S, Herrigel A (2000) Watermark copy attack. In: Wong PW, Delp EJ (eds) IS&T/SPIE’s 12th annual symposium, electronic imaging 2000: security and watermarking of multimedia content II, vol 3971 of SPIE Proceedings, San Jose, California USA, 23–28 January 2000
51.
Zurück zum Zitat Liu L-M, Han G-Q, Wo Y, Wang C-S (2010) A wavelet-domain watermarking algorithm against geometric attacks based on SUSAN feature points. IEEE, pp 1–5 Liu L-M, Han G-Q, Wo Y, Wang C-S (2010) A wavelet-domain watermarking algorithm against geometric attacks based on SUSAN feature points. IEEE, pp 1–5
52.
Zurück zum Zitat Pal AK, Das P, Dey N (2013) Odd-even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:1303.5972 Pal AK, Das P, Dey N (2013) Odd-even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:​1303.​5972
Metadaten
Titel
Digital Watermarking: A Potential Solution for Multimedia Authentication
verfasst von
Kaiser J. Giri
Rumaan Bashir
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-44790-2_5