Invisible watermarking for image verification

被引:74
作者
Yeung, MM [1 ]
Mintzer, FC [1 ]
机构
[1] IBM Corp, TJ Watson Res Ctr, Image Lib Applicat, Yorktown Heights, NY 10598 USA
关键词
D O I
10.1117/1.482612
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we propose a new method for invisibly watermarking high-quality color and gray-scale images. This method is intended for use in image verification applications to determine whether the content of an image has been altered, due perhaps, to the act of a malicious party. It consists of both a watermarking process which stamps a watermark into a source image without visual degradation, and a watermark extraction process which extracts a watermark from a stamped image. The extracted watermark can be compared with the embedded watermark to determine whether the image has been altered. The processing used in the watermarking and watermark extraction processes will be presented in this paper. In addition, we shall describe some modifications that provide better security, and an adaptation of the scheme to watermark JPEG images. Experimental results are reported. Some advantages of this technique over other invisible watermarking techniques for verification will be discussed; these include a high degree of invisibility color preservation, ease of extraction, and a high degree of protection against the retention of a correct watermark after alteration by a malicious party. (C) 1998 SPIE and IS&T. [S1017-9909(98)00903-9].
引用
收藏
页码:578 / 591
页数:14
相关论文
共 20 条
[1]  
[Anonymous], P IEEE INT C IM PROC
[2]  
Arrowsmith D.K., 1990, INTRO DYNAMICAL SYST
[3]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[4]  
CARUSO D, 1995, NY TIMES NEWS S 0807
[5]  
COX IJ, 1995, 9510 NEC RES I
[6]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586
[7]   THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE [J].
FRIEDMAN, GL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) :905-910
[8]  
MINTZER F, 1996, IBM J RES DEV, V40
[9]  
MINTZER FC, 1992, 1992 SID INT S, P377
[10]  
MINTZER FC, 1997, P INT C IM PROC OCT, V3