Skip to main content
Top

2017 | OriginalPaper | Chapter

Digital Watermarking: A Potential Solution for Multimedia Authentication

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The digitization has resulted in knowledge explosion in the modern technology-driven world and has led to the encouragement and motivation for digitization of the intellectual artifact. The combining, replication, and distribution facility of the digital media such as text, images, audio, and video easier and faster has no doubt revolutionized the world. However, the unauthorized use and maldistribution of information by online pirates is the sole threat that refrains the information proprietors to share their digital property. It is therefore imperative to come up with standard means to protect the intellectual property rights (IRP) of the multimedia data, thereby developing the effective multimedia authentication techniques to discourage the illegitimate distribution of information content. Digital watermarking, which is believed to be the potential means among the various possible approaches, to encourage the content providers to secure their digital property while maintaining its availability, has been entreated as a potential mechanism to protect IRP of multimedia contents.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Singh N, Sharma D (2015) A review on watermarking & image encoding. Int J Comput Sci Mobile Comput 4(6):632–636MathSciNet Singh N, Sharma D (2015) A review on watermarking & image encoding. Int J Comput Sci Mobile Comput 4(6):632–636MathSciNet
2.
go back to reference Giri KJ, Peer MA, Nagabhushan P (2014) A channel wise color image watermarking scheme based on discrete wavelet transformation. In: Proceedings of IEEE international conference on computing for sustainable global environment trans, pp 758–762 Giri KJ, Peer MA, Nagabhushan P (2014) A channel wise color image watermarking scheme based on discrete wavelet transformation. In: Proceedings of IEEE international conference on computing for sustainable global environment trans, pp 758–762
3.
go back to reference Nin J, Ricciardi S (2013) Digital watermarking techniques and security issues in the information and communication society. In: International conference on advanced information networking and applications, pp 1553–1558 Nin J, Ricciardi S (2013) Digital watermarking techniques and security issues in the information and communication society. In: International conference on advanced information networking and applications, pp 1553–1558
4.
go back to reference Sequeira A, Kundur D (2001) Communications and information theory in watermarking: a survey. In: Proceedings of SPIE multimedia systems and application IV, vol 4518, pp 216–227 Sequeira A, Kundur D (2001) Communications and information theory in watermarking: a survey. In: Proceedings of SPIE multimedia systems and application IV, vol 4518, pp 216–227
5.
go back to reference Cox IJ, Miller ML (2001) Electronic watermarking. In: IEEE fourth workshop on multimedia signal processing, pp 225–230 Cox IJ, Miller ML (2001) Electronic watermarking. In: IEEE fourth workshop on multimedia signal processing, pp 225–230
6.
go back to reference Cox IJ, Miller ML, Bloom JA, Friedrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufman, San Francisco Cox IJ, Miller ML, Bloom JA, Friedrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufman, San Francisco
7.
go back to reference Schyndel RGV, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proceedings of IEEE international conference on image processing, vol 2, pp 86–90 Schyndel RGV, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proceedings of IEEE international conference on image processing, vol 2, pp 86–90
8.
go back to reference Tirkel AZ, Rankin GA, Van Schyndel RM, Ho WJ, Mee NRA, Osborne CF (1993) Electronic water mark. DICTA, Macquarie University, pp 666–673 Tirkel AZ, Rankin GA, Van Schyndel RM, Ho WJ, Mee NRA, Osborne CF (1993) Electronic water mark. DICTA, Macquarie University, pp 666–673
9.
go back to reference Kaiser J, Giri M, Nagabhushan P (2015) A robust color image watermarking scheme using discrete wavelet transformation. Int J Image Graph Signal Process 1:47–52 Kaiser J, Giri M, Nagabhushan P (2015) A robust color image watermarking scheme using discrete wavelet transformation. Int J Image Graph Signal Process 1:47–52
10.
go back to reference Giri KJ, Peer MA, Nagabhushan P (2013) Copyrirght protection of color images using novel wavelet based watermarking algorithm. In: Press: 2nd IEEE international conference on image information processing, JUIT, Shimla, India Giri KJ, Peer MA, Nagabhushan P (2013) Copyrirght protection of color images using novel wavelet based watermarking algorithm. In: Press: 2nd IEEE international conference on image information processing, JUIT, Shimla, India
11.
go back to reference Kutter M, Petitcolas F (1999) A fair benchmark for image watermarking systems. In: Electronic imaging 199: security and watermarking of multimedia content, vol 3657 of SPIE Proceedings, San Jose, California USA, 25–27 January 1999 Kutter M, Petitcolas F (1999) A fair benchmark for image watermarking systems. In: Electronic imaging 199: security and watermarking of multimedia content, vol 3657 of SPIE Proceedings, San Jose, California USA, 25–27 January 1999
12.
go back to reference Jithin VM, Gupta KK (2013) Robust invisible QR code image watermarking in DWT domain. Int J Electron Commun Eng Technol (IJECET) 4(7):190–195 Jithin VM, Gupta KK (2013) Robust invisible QR code image watermarking in DWT domain. Int J Electron Commun Eng Technol (IJECET) 4(7):190–195
13.
go back to reference Zhao M, Dang Y (2008) Color image copyright protection digital watermarking algorithm based on DWT & DCT. IEEE, pp 1–4 Zhao M, Dang Y (2008) Color image copyright protection digital watermarking algorithm based on DWT & DCT. IEEE, pp 1–4
14.
go back to reference Anuradha RPS (2006) DWT based watermarking algorithm using haar wavelet. Int J Electron Comput Sci Eng 1:1–6 Anuradha RPS (2006) DWT based watermarking algorithm using haar wavelet. Int J Electron Comput Sci Eng 1:1–6
15.
go back to reference Zhang Y, Wang J, Chen X (2012) Watermarking technique based on wavelet transform for color images. In: 24th Chinese Control and Decision Conference (CCDC), pp 1909–1913 Zhang Y, Wang J, Chen X (2012) Watermarking technique based on wavelet transform for color images. In: 24th Chinese Control and Decision Conference (CCDC), pp 1909–1913
16.
go back to reference Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: 2012 World Congress on Information and Communication Technologies (WICT). IEEE, pp 230–235 Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: 2012 World Congress on Information and Communication Technologies (WICT). IEEE, pp 230–235
17.
go back to reference Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7):33CrossRef Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7):33CrossRef
18.
go back to reference Dey N, Das P, Chaudhuri SS, Das A (2012) Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. In: Proceedings of the fifth international conference on security of information and networks. ACM, pp 87–94 Dey N, Das P, Chaudhuri SS, Das A (2012) Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. In: Proceedings of the fifth international conference on security of information and networks. ACM, pp 87–94
19.
go back to reference Dey N, Biswas D, Roy AB, Das A, Chaudhuri SS (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA). IEEE, pp 680–685 Dey N, Biswas D, Roy AB, Das A, Chaudhuri SS (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA). IEEE, pp 680–685
20.
go back to reference Dey N, Roy AB, Das A, Chaudhuri SS (2012) Stationary wavelet transformation based self-recovery of blind-watermark from electrocardiogram signal in wireless telecardiology. In: Recent trends in computer networks and distributed systems security. Springer, Berlin, pp 347–357 Dey N, Roy AB, Das A, Chaudhuri SS (2012) Stationary wavelet transformation based self-recovery of blind-watermark from electrocardiogram signal in wireless telecardiology. In: Recent trends in computer networks and distributed systems security. Springer, Berlin, pp 347–357
21.
go back to reference Khalifa A, Hamad S (2012) A robust non-blind algorithm for watermarking color images using multi-resolution wavelet decomposition. Int J Comput Appl 37(8):0975–8887 Khalifa A, Hamad S (2012) A robust non-blind algorithm for watermarking color images using multi-resolution wavelet decomposition. Int J Comput Appl 37(8):0975–8887
22.
go back to reference Elbasi E, Eskicioglu AM (2006) A semi-blind watermarking scheme for color images. Int J Technol Eng Syst (IJTES) 2(3):276–281 Elbasi E, Eskicioglu AM (2006) A semi-blind watermarking scheme for color images. Int J Technol Eng Syst (IJTES) 2(3):276–281
23.
go back to reference Craver S, Memon N, Yeo B, Young M (1997) On the invertibility of invisible watermarking techniques. In: Proceedings of the IEEE International Conference on Image Processing, vol 1, pp 540–543 Craver S, Memon N, Yeo B, Young M (1997) On the invertibility of invisible watermarking techniques. In: Proceedings of the IEEE International Conference on Image Processing, vol 1, pp 540–543
24.
go back to reference Hua Y, Wu B, Wu G (2010) A color image fragile watermarking algorithm based on DWT-DCT. In: Chinese control and decision conference, pp 2840–2845 Hua Y, Wu B, Wu G (2010) A color image fragile watermarking algorithm based on DWT-DCT. In: Chinese control and decision conference, pp 2840–2845
25.
go back to reference Hartung F, Girod B (1997) Digital watermarking of raw and compressed video. In: Proceedings of SPIE 2952: digital compression technologies and systems for video communication, pp 205–213 Hartung F, Girod B (1997) Digital watermarking of raw and compressed video. In: Proceedings of SPIE 2952: digital compression technologies and systems for video communication, pp 205–213
26.
go back to reference Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66:283–301CrossRefMATH Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66:283–301CrossRefMATH
27.
go back to reference Chavan SK, Shah R, Poojary R, Jose J, George G (2010) A novel robust colour watermarking scheme for colour watermark images in frequency domain. In: International conference on advances in recent technologies in communication and computing, pp 96–100 Chavan SK, Shah R, Poojary R, Jose J, George G (2010) A novel robust colour watermarking scheme for colour watermark images in frequency domain. In: International conference on advances in recent technologies in communication and computing, pp 96–100
28.
go back to reference Brassil J, Low S, Maxemchuk N, O’Gorman L (1994) Electronic marking and identification techniques to discourse document copying. Proc INFOCOM 13(8):1495–1504 Brassil J, Low S, Maxemchuk N, O’Gorman L (1994) Electronic marking and identification techniques to discourse document copying. Proc INFOCOM 13(8):1495–1504
29.
go back to reference Langelaar GC, Lagendijk RL, Biemond J (1998) Real-time labeling of MPEG-2 compressed video. J Vis Commun Image Represent 9(4):256–270CrossRef Langelaar GC, Lagendijk RL, Biemond J (1998) Real-time labeling of MPEG-2 compressed video. J Vis Commun Image Represent 9(4):256–270CrossRef
30.
go back to reference Dey N, Dey M, Mahata SK, Das A, Chaudhuri SS (2015) Tamper detection of electrocardiographic signal using watermarked bio–hash code in wireless cardiology. Int J Signal Imaging Syst Eng 8(1–2):46–58CrossRef Dey N, Dey M, Mahata SK, Das A, Chaudhuri SS (2015) Tamper detection of electrocardiographic signal using watermarked bio–hash code in wireless cardiology. Int J Signal Imaging Syst Eng 8(1–2):46–58CrossRef
31.
go back to reference Friedman G (1993) The trustworthy digital camera. IEEE Trans Consum Electron 39(4):93–103CrossRef Friedman G (1993) The trustworthy digital camera. IEEE Trans Consum Electron 39(4):93–103CrossRef
32.
go back to reference Cox IJ, Miller M, Bloom J (2001) Digital watermarking: principles and practice. Morgan Kaufmann 10:1558607145 Cox IJ, Miller M, Bloom J (2001) Digital watermarking: principles and practice. Morgan Kaufmann 10:1558607145
33.
go back to reference Wolfgang RB, Delp EJ (1999) Fragile watermarking using the VW2D watermark. Proc Electron Imaging 3657:204–213 Wolfgang RB, Delp EJ (1999) Fragile watermarking using the VW2D watermark. Proc Electron Imaging 3657:204–213
34.
go back to reference Anderson RJ, Petitcolas FAP (1998) On the limits of Steganography. IEEE J Sel Areas Commun 16:474–481CrossRef Anderson RJ, Petitcolas FAP (1998) On the limits of Steganography. IEEE J Sel Areas Commun 16:474–481CrossRef
35.
go back to reference Brassil J, Low S, Maxemchuk N, O’Gorman L (1995) Hiding information in document images. In: Proceedings of the 29th annual conference on information sciences and systems, pp 482–489 Brassil J, Low S, Maxemchuk N, O’Gorman L (1995) Hiding information in document images. In: Proceedings of the 29th annual conference on information sciences and systems, pp 482–489
36.
go back to reference Dey N, Biswas S, Roy AB, Das A, Chowdhuri SS (2013) Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology Dey N, Biswas S, Roy AB, Das A, Chowdhuri SS (2013) Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology
37.
go back to reference Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS). IEEE, pp 624–627 Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS). IEEE, pp 624–627
38.
go back to reference Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 105–110 Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 105–110
39.
go back to reference Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. arXiv preprint arXiv:1304.2310 Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. arXiv preprint arXiv:​1304.​2310
40.
go back to reference Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authentication using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2(3):749–757 Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authentication using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2(3):749–757
41.
go back to reference Liu K-C (2009) Human visual system based watermarking for color images. In: Fifth international conference on information assurance and security, vol 2, pp 623–626 Liu K-C (2009) Human visual system based watermarking for color images. In: Fifth international conference on information assurance and security, vol 2, pp 623–626
42.
go back to reference Qiang S, Hongbin Z (2010) Color image self-embedding and watermarking based on DWT. In: International conference on measuring technology and mechatronics automation, vol 1, pp 796–799 Qiang S, Hongbin Z (2010) Color image self-embedding and watermarking based on DWT. In: International conference on measuring technology and mechatronics automation, vol 1, pp 796–799
43.
go back to reference Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394CrossRef Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394CrossRef
44.
go back to reference Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326CrossRef Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326CrossRef
45.
go back to reference Acharjee S, Chakraborty S, Samanta S, Azar AT, Hassanien AE, Dey N (2014) Highly secured multilayered motion vector watermarking. In: advanced machine learning technologies and applications. Springer, Berlin, pp 121–134 Acharjee S, Chakraborty S, Samanta S, Azar AT, Hassanien AE, Dey N (2014) Highly secured multilayered motion vector watermarking. In: advanced machine learning technologies and applications. Springer, Berlin, pp 121–134
46.
go back to reference Dey, N., Das, P., Roy, A. B., Das, A., &Chaudhuri, S. S. (2012, October). DWT-DCT-SVD based intravascular ultrasound video watermarking. In Information and Communication Technologies (WICT), 2012 World Congress on (pp. 224–229). IEEE Dey, N., Das, P., Roy, A. B., Das, A., &Chaudhuri, S. S. (2012, October). DWT-DCT-SVD based intravascular ultrasound video watermarking. In Information and Communication Technologies (WICT), 2012 World Congress on (pp. 224–229). IEEE
47.
go back to reference Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri, SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6 Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri, SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6
48.
go back to reference Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: towards a second generation watermarking benchmark. In: Signal processing, Special Issue on Information Theoretic Issues in Digital Watermarking Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: towards a second generation watermarking benchmark. In: Signal processing, Special Issue on Information Theoretic Issues in Digital Watermarking
49.
go back to reference Hartung F, Su JK, Girod B (1999) Spread spectrum watermarking: malicious attacks and counter-attacks. In: Proceedings of SPIE vol 3657: security and watermarking of multimedia contents, San Jose, CA, USA Hartung F, Su JK, Girod B (1999) Spread spectrum watermarking: malicious attacks and counter-attacks. In: Proceedings of SPIE vol 3657: security and watermarking of multimedia contents, San Jose, CA, USA
50.
go back to reference Kutter M, Voloshynovskiy S, Herrigel A (2000) Watermark copy attack. In: Wong PW, Delp EJ (eds) IS&T/SPIE’s 12th annual symposium, electronic imaging 2000: security and watermarking of multimedia content II, vol 3971 of SPIE Proceedings, San Jose, California USA, 23–28 January 2000 Kutter M, Voloshynovskiy S, Herrigel A (2000) Watermark copy attack. In: Wong PW, Delp EJ (eds) IS&T/SPIE’s 12th annual symposium, electronic imaging 2000: security and watermarking of multimedia content II, vol 3971 of SPIE Proceedings, San Jose, California USA, 23–28 January 2000
51.
go back to reference Liu L-M, Han G-Q, Wo Y, Wang C-S (2010) A wavelet-domain watermarking algorithm against geometric attacks based on SUSAN feature points. IEEE, pp 1–5 Liu L-M, Han G-Q, Wo Y, Wang C-S (2010) A wavelet-domain watermarking algorithm against geometric attacks based on SUSAN feature points. IEEE, pp 1–5
52.
go back to reference Pal AK, Das P, Dey N (2013) Odd-even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:1303.5972 Pal AK, Das P, Dey N (2013) Odd-even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:​1303.​5972
Metadata
Title
Digital Watermarking: A Potential Solution for Multimedia Authentication
Authors
Kaiser J. Giri
Rumaan Bashir
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-44790-2_5

Premium Partner