Abstract
This paper presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images is described. The system is based on a new watermarking technique, which is robust against image transformation techniques such as compression, rotation, translation, scaling and cropping. It uses modulation of the magnitude components in Fourier space to embed a watermark and an accompanying template and, during watermark extraction, reads a template in the log polar transform of the frequency domain. The template is used for analyzing scaling and rotation suffered by the watermarked stego-image. The detection of the watermarks is also possible without any need for the original cover-image. In addition, the system applies asymmetric cryptographic protocols for different purposes, namely embedding/detecting the watermark and transferring watermarked data. The public key technique is applied for the construction of a one-way watermark embedding and the verification function to identify and prove the uniqueness of the watermark. Legal dispute resolution is supported for the multiple watermarking of a digital image without revealing the confidential keying information.
All methods, procedures and schemes presented in this paper are based on the European patent application No. 97 810 708.4
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
C. Cox, J. Killian, T. Leighton and T. Shamoon, “Secure spread spectrum communication for multimedia”, Technical report, N.E.C. Research Institute, 1995.
G. Caronni “Assuring Ownership Rights for Digital Images” in H. H. Brueggemann and W. Gerhardt-Haeckl, editors, Reliable IT Systems VIS’ 95, Vieweg, Germany, 1995, pp. 251–264.
W. G. Chambers, “Basics of Communications and Coding”, Oxford Science Publications. Clarendon Press Oxford, 1985.
S. Craver, Memon, B. Yeo and M. Yeung, “Can invisible marks resolve rightful ownerships?”, IS&T/SPIE Electronic Imaging’ 97: “Storage and Retrieval of Image and Video Databases”, 1997.
P. Davern and M. Scott, “Fractal based image steganography”, Proc. International Workshop in Information Hiding, LNCS, Springer, 1996, pp. 279–294.
J.-F. Delaigle, J-M. Boucqueau, J.-J. Quisquater and B. Macq, “Digital Images protection techniques in a broadcast framework: An overview”, Laboratoire de Télécommunications et de Télédéction, Université Catholique de Louvain, 1996.
A. Freier, P. Karlton and P. Kocher, “SSL Version 3.0”, Netscape Communications, Version 3.0, November 1996.
P. Horster, M. Michels, H. Petersen, ‘“Meta signature schemes giving message recovery based on the discrete logarithm problem”’, Proc. 2nd Int. Workshop on IT-Security, September, 1994, pp. 82–92.
ISO/ IEC 11770-3, “Information technology-Security techniques-Key management, Part 3: Mechanisms using asymmetric techniques”, 1995.
M.G. Kuhn, “StirMark”, http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/, November 1997.
K. Matsui and K. Tanaka, “Video-Steganography: How to secretly embed a signature in a picture”, IMA Intellectual Property Project Proceedings, January 1994, pp. 187–206.
A.J. Menezes, P.C. Van Oorschot and S.A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996.
K. Nyberg, R. Rueppel, “Message recovery for signature schemes based on the discrete logarithm problem”, LNCS 950, Advances in Cryptology: Proc. Eurocrypt’ 94, Springer, (1994), pp. 182–193.
J. K. óRuanaidh, W. J. Dowling and F. M. Boland, “Phase watermarking of images”, IEEE International Conference on Image Processing, September 1996.
J. J. K. óRuanaidh, W. J. Dowling and F. M. Boland, “Watermarking digital images for copyright protection”, IEEE Proceedings on Vision, Image and Signal Processing, Vol. 143, No. 4, August 1996, pp. 250–256.
W. B. Pennebaker and J. L. Mitchell, “JPEG Still Image Compression Standard”, Van Nostrand Reinhold, New York, 1993.
W.H. Press, S.A. Teukolsky, W.T. Vetterling and B.P. Flannery, “Numerical Recipes in C”, Cambridge University Press, second edition, 1992.
J. Smith and B. Comiskey, “Modulation and information hiding in images”, Proc. Workshop in Information Hiding, LNCS 1173, Springer, 1996, pp. 207–226.
B. Schneier, “Applied Cryptography”, Wiley, 2nd edition, 1995.
A. Z. Tirkel, G. A. Rankin, R. G. van Schyndel, W. J. Ho, N. R. A. Mee and C. F. Osborne, “Electronic watermark”, Dicta-93, December 1993, pp. 666–672.
A. Z. Tirkel, R. G. van Schyndel and C. F. Osborne, “a two-dimensional digital watermark”, Proc. ACCV’95, December 1995, pp. 378–383.
“UnZign”, http://www.altern.org/watermark/, 1997.
J. Zhao and E. Koch, “Embedding robust labels into images for copyright protection”, Technical report, Fraunhofer Institute for Computer Graphics, Darmstadt, Germany, 1994.
J. Zhao, “A WWW Service To Embed And Prove Digital Copyright Watermarks”, Proc. Of the European Conference on Multimedia Application, Services and Techniques, May 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Herrigel, A., Ruanaidh, J.ó., Petersen, H., Pereira, S., Pun, T. (1998). Secure Copyright Protection Techniques for Digital Images. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_13
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive