Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking

  • Conference paper
Information Hiding (IH 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1768))

Included in the following conference series:

Abstract

This paper proposes a new approach for assessing the presence of a digital watermark in images and videos. This approach relies on a Bayesian formulation that allows to compute the probability that a watermark was generated using a given key. The watermarking itself relies on the discrete Fourier transform (DFT) of the image, of video frames or of three dimensional chunks of video scene.

Two kinds of information are hidden in the digital data: a watermark and a template. Both are encoded using an owner key to ensure the system security and are embedded in the 2D or 3D DFT magnitude of the image or video. The watermark is encoded in the form of a spread spectrum signal. The template is a key based grid and is used to detect and invert the effect of an affine geometric transformation (rotations, scaling and/or aspect ratio change) or in the case of the video frame-rate changes, aspect-ratio modification and rescaling of frames.

It is shown that, for the spread spectrum signal described in the paper, it is possible to positively detect the presence of a watermark without necessarily decoding it, given only the key used to generate it. To do that, the Bayesian approach allows the deduction of the relative log-probability of the presence of a watermark in an image given only the key. All that is required for positive watermark verification is the key. This approach also allows to infer the number of bits contained in the watermark.

The performance of the presented techniques and the usefulness of the relative log-probability are shown through various applications and experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cox, I., Killian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proceedings of the IEEE Int. Conf. on Image Processing ICIP 1996, Lausanne, Switzerland, pp. 243–246 (1996)

    Google Scholar 

  2. Deguillaume, F., Csurka, G., Ó Ruanaidh, J. J. K. and Pun. T.: Robust 3d dft video watermarking. In: IS&T/SPIE Electronic Imaging’99, Session: Security and Watermarking of Multimedia Contents, San Jose, CA, USA (January 1999)

    Google Scholar 

  3. Dinan, E.H., Jabbari, B.: Spreading codes for direct sequence CDMA and wideband CDMA cellular network. IEEE Communications Magazine, june 1998, 48–54 (1998)

    Google Scholar 

  4. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 283–301 (1998)

    Article  MATH  Google Scholar 

  5. Hernández, J.R., Pérez-González, F., Rodrígez, J.M., Nieto, G.: Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE Journal on Selected Areas in Communications 16(4), 510–523 (1998)

    Google Scholar 

  6. Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. Electronic Imaging 1999, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, January 1999, Vol. 3657, pp. 219–239 (1999)

    Google Scholar 

  7. Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Processing 66, 385–403 (1998)

    Article  MATH  Google Scholar 

  8. Joe, J. K., Ó Ruanaidh, J.J.K., Pun, T.: Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing 66(3), 303–317 (1998) (Special Issue on Copyright Protection and Control, B. Macq and I. Pitas, eds.)

    Google Scholar 

  9. Pereira, S., Deguillaume, F., Csurka, G., Pun, T.: Template based recovery of Fourier-based watermarks using Log-polar and Log-log maps. In: Int. Conference on Multimedia Computing and Systems, Special Session on Multimedia Data Security and Watermarking, Juin (1999)

    Google Scholar 

  10. Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of spread spectrum communications - A tutorial. IEEE Transactions on Communications COM-30(5), 855–884 (1982)

    Google Scholar 

  11. Ó Ruanaidh, J.J.K., Pun, T., Fitzgerald, W.J.: Numerical Bayesian Methods Applied to Signal Processing. Series on Statistics and Computing. Springer, Heidelberg (1996)

    Google Scholar 

  12. Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution scene-based video watermarking using perceptual models. IEEE Journal on Selected Areas in Communications 16(4), 540–550 (1998)

    Article  Google Scholar 

  13. Tirkel, A.Z., Rankin, G.A., van Schyndel, R.G., Ho, W.J., Mee, N.R.A., Osborne, C.F.: Electronic watermark. In: Dicta-93, Macquarie University, Sydney, December 1993, pp. 666–672 (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Csurka, G., Deguillaume, F., Ó Ruanaidh, J.J.K., Pun, T. (2000). A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_19

Download citation

  • DOI: https://doi.org/10.1007/10719724_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67182-4

  • Online ISBN: 978-3-540-46514-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics