Abstract
This paper presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images is described. The system is based on a new watermarking technique, which is robust against image transformation techniques such as compression, rotation, translation, scaling and cropping. It uses modulation of the magnitude components in Fourier space to embed a watermark and an accompanying template and, during watermark extraction, reads a template in the log polar transform of the frequency domain. The template is used for analyzing scaling and rotation suffered by the watermarked stego-image. The detection of the watermarks is also possible without any need for the original cover-image. In addition, the system applies asymmetric cryptographic protocols for different purposes, namely embedding/detecting the watermark and transferring watermarked data. The public key technique is applied for the construction of a one-way watermark embedding and the verification function to identify and prove the uniqueness of the watermark. Legal dispute resolution is supported for the multiple watermarking of a digital image without revealing the confidential keying information.
All methods, procedures and schemes presented in this paper are based on the European patent application No. 97 810 708.4
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
C. Cox, J. Killian, T. Leighton and T. Shamoon, โSecure spread spectrum communication for multimediaโ, Technical report, N.E.C. Research Institute, 1995.
G. Caronni โAssuring Ownership Rights for Digital Imagesโ in H. H. Brueggemann and W. Gerhardt-Haeckl, editors, Reliable IT Systems VISโ 95, Vieweg, Germany, 1995, pp. 251โ264.
W. G. Chambers, โBasics of Communications and Codingโ, Oxford Science Publications. Clarendon Press Oxford, 1985.
S. Craver, Memon, B. Yeo and M. Yeung, โCan invisible marks resolve rightful ownerships?โ, IS&T/SPIE Electronic Imagingโ 97: โStorage and Retrieval of Image and Video Databasesโ, 1997.
P. Davern and M. Scott, โFractal based image steganographyโ, Proc. International Workshop in Information Hiding, LNCS, Springer, 1996, pp. 279โ294.
J.-F. Delaigle, J-M. Boucqueau, J.-J. Quisquater and B. Macq, โDigital Images protection techniques in a broadcast framework: An overviewโ, Laboratoire de Tรฉlรฉcommunications et de Tรฉlรฉdรฉction, Universitรฉ Catholique de Louvain, 1996.
A. Freier, P. Karlton and P. Kocher, โSSL Version 3.0โ, Netscape Communications, Version 3.0, November 1996.
P. Horster, M. Michels, H. Petersen, โโMeta signature schemes giving message recovery based on the discrete logarithm problemโโ, Proc. 2nd Int. Workshop on IT-Security, September, 1994, pp. 82โ92.
ISO/ IEC 11770-3, โInformation technology-Security techniques-Key management, Part 3: Mechanisms using asymmetric techniquesโ, 1995.
M.G. Kuhn, โStirMarkโ, http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/, November 1997.
K. Matsui and K. Tanaka, โVideo-Steganography: How to secretly embed a signature in a pictureโ, IMA Intellectual Property Project Proceedings, January 1994, pp. 187โ206.
A.J. Menezes, P.C. Van Oorschot and S.A. Vanstone, โHandbook of Applied Cryptographyโ, CRC Press, 1996.
K. Nyberg, R. Rueppel, โMessage recovery for signature schemes based on the discrete logarithm problemโ, LNCS 950, Advances in Cryptology: Proc. Eurocryptโ 94, Springer, (1994), pp. 182โ193.
J. K. รณRuanaidh, W. J. Dowling and F. M. Boland, โPhase watermarking of imagesโ, IEEE International Conference on Image Processing, September 1996.
J. J. K. รณRuanaidh, W. J. Dowling and F. M. Boland, โWatermarking digital images for copyright protectionโ, IEEE Proceedings on Vision, Image and Signal Processing, Vol. 143, No. 4, August 1996, pp. 250โ256.
W. B. Pennebaker and J. L. Mitchell, โJPEG Still Image Compression Standardโ, Van Nostrand Reinhold, New York, 1993.
W.H. Press, S.A. Teukolsky, W.T. Vetterling and B.P. Flannery, โNumerical Recipes in Cโ, Cambridge University Press, second edition, 1992.
J. Smith and B. Comiskey, โModulation and information hiding in imagesโ, Proc. Workshop in Information Hiding, LNCS 1173, Springer, 1996, pp. 207โ226.
B. Schneier, โApplied Cryptographyโ, Wiley, 2nd edition, 1995.
A. Z. Tirkel, G. A. Rankin, R. G. van Schyndel, W. J. Ho, N. R. A. Mee and C. F. Osborne, โElectronic watermarkโ, Dicta-93, December 1993, pp. 666โ672.
A. Z. Tirkel, R. G. van Schyndel and C. F. Osborne, โa two-dimensional digital watermarkโ, Proc. ACCVโ95, December 1995, pp. 378โ383.
โUnZignโ, http://www.altern.org/watermark/, 1997.
J. Zhao and E. Koch, โEmbedding robust labels into images for copyright protectionโ, Technical report, Fraunhofer Institute for Computer Graphics, Darmstadt, Germany, 1994.
J. Zhao, โA WWW Service To Embed And Prove Digital Copyright Watermarksโ, Proc. Of the European Conference on Multimedia Application, Services and Techniques, May 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
ยฉ 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Herrigel, A., Ruanaidh, J.รณ., Petersen, H., Pereira, S., Pun, T. (1998). Secure Copyright Protection Techniques for Digital Images. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_13
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive