Nothing Special   »   [go: up one dir, main page]

Skip to main content

Secure Copyright Protection Techniques for Digital Images

  • Conference paper
  • First Online:
Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

This paper presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images is described. The system is based on a new watermarking technique, which is robust against image transformation techniques such as compression, rotation, translation, scaling and cropping. It uses modulation of the magnitude components in Fourier space to embed a watermark and an accompanying template and, during watermark extraction, reads a template in the log polar transform of the frequency domain. The template is used for analyzing scaling and rotation suffered by the watermarked stego-image. The detection of the watermarks is also possible without any need for the original cover-image. In addition, the system applies asymmetric cryptographic protocols for different purposes, namely embedding/detecting the watermark and transferring watermarked data. The public key technique is applied for the construction of a one-way watermark embedding and the verification function to identify and prove the uniqueness of the watermark. Legal dispute resolution is supported for the multiple watermarking of a digital image without revealing the confidential keying information.

All methods, procedures and schemes presented in this paper are based on the European patent application No. 97 810 708.4

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. C. Cox, J. Killian, T. Leighton and T. Shamoon, “Secure spread spectrum communication for multimedia”, Technical report, N.E.C. Research Institute, 1995.

    Google Scholar 

  2. G. Caronni “Assuring Ownership Rights for Digital Images” in H. H. Brueggemann and W. Gerhardt-Haeckl, editors, Reliable IT Systems VIS’ 95, Vieweg, Germany, 1995, pp. 251–264.

    Google Scholar 

  3. W. G. Chambers, “Basics of Communications and Coding”, Oxford Science Publications. Clarendon Press Oxford, 1985.

    Google Scholar 

  4. S. Craver, Memon, B. Yeo and M. Yeung, “Can invisible marks resolve rightful ownerships?”, IS&T/SPIE Electronic Imaging’ 97: “Storage and Retrieval of Image and Video Databases”, 1997.

    Google Scholar 

  5. P. Davern and M. Scott, “Fractal based image steganography”, Proc. International Workshop in Information Hiding, LNCS, Springer, 1996, pp. 279–294.

    Chapter  Google Scholar 

  6. J.-F. Delaigle, J-M. Boucqueau, J.-J. Quisquater and B. Macq, “Digital Images protection techniques in a broadcast framework: An overview”, Laboratoire de Télécommunications et de Télédéction, Université Catholique de Louvain, 1996.

    Google Scholar 

  7. A. Freier, P. Karlton and P. Kocher, “SSL Version 3.0”, Netscape Communications, Version 3.0, November 1996.

    Google Scholar 

  8. P. Horster, M. Michels, H. Petersen, ‘“Meta signature schemes giving message recovery based on the discrete logarithm problem”’, Proc. 2nd Int. Workshop on IT-Security, September, 1994, pp. 82–92.

    Google Scholar 

  9. ISO/ IEC 11770-3, “Information technology-Security techniques-Key management, Part 3: Mechanisms using asymmetric techniques”, 1995.

    Google Scholar 

  10. M.G. Kuhn, “StirMark”, http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/, November 1997.

  11. K. Matsui and K. Tanaka, “Video-Steganography: How to secretly embed a signature in a picture”, IMA Intellectual Property Project Proceedings, January 1994, pp. 187–206.

    Google Scholar 

  12. A.J. Menezes, P.C. Van Oorschot and S.A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996.

    Google Scholar 

  13. K. Nyberg, R. Rueppel, “Message recovery for signature schemes based on the discrete logarithm problem”, LNCS 950, Advances in Cryptology: Proc. Eurocrypt’ 94, Springer, (1994), pp. 182–193.

    Chapter  Google Scholar 

  14. J. K. óRuanaidh, W. J. Dowling and F. M. Boland, “Phase watermarking of images”, IEEE International Conference on Image Processing, September 1996.

    Google Scholar 

  15. J. J. K. óRuanaidh, W. J. Dowling and F. M. Boland, “Watermarking digital images for copyright protection”, IEEE Proceedings on Vision, Image and Signal Processing, Vol. 143, No. 4, August 1996, pp. 250–256.

    Article  Google Scholar 

  16. W. B. Pennebaker and J. L. Mitchell, “JPEG Still Image Compression Standard”, Van Nostrand Reinhold, New York, 1993.

    Google Scholar 

  17. W.H. Press, S.A. Teukolsky, W.T. Vetterling and B.P. Flannery, “Numerical Recipes in C”, Cambridge University Press, second edition, 1992.

    Google Scholar 

  18. J. Smith and B. Comiskey, “Modulation and information hiding in images”, Proc. Workshop in Information Hiding, LNCS 1173, Springer, 1996, pp. 207–226.

    Chapter  Google Scholar 

  19. B. Schneier, “Applied Cryptography”, Wiley, 2nd edition, 1995.

    Google Scholar 

  20. A. Z. Tirkel, G. A. Rankin, R. G. van Schyndel, W. J. Ho, N. R. A. Mee and C. F. Osborne, “Electronic watermark”, Dicta-93, December 1993, pp. 666–672.

    Google Scholar 

  21. A. Z. Tirkel, R. G. van Schyndel and C. F. Osborne, “a two-dimensional digital watermark”, Proc. ACCV’95, December 1995, pp. 378–383.

    Google Scholar 

  22. “UnZign”, http://www.altern.org/watermark/, 1997.

  23. J. Zhao and E. Koch, “Embedding robust labels into images for copyright protection”, Technical report, Fraunhofer Institute for Computer Graphics, Darmstadt, Germany, 1994.

    Google Scholar 

  24. J. Zhao, “A WWW Service To Embed And Prove Digital Copyright Watermarks”, Proc. Of the European Conference on Multimedia Application, Services and Techniques, May 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Herrigel, A., Ruanaidh, J.ó., Petersen, H., Pereira, S., Pun, T. (1998). Secure Copyright Protection Techniques for Digital Images. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics