An algorithm for removable visible watermarking

被引:61
作者
Hu, YJ [1 ]
Kwong, S
Huang, JW
机构
[1] S China Univ Technol, Coll Automat Sci & Engn, Guangzhou 510640, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[3] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Peoples R China
基金
中国国家自然科学基金;
关键词
image watermarking; removable watermarking; visible watermark;
D O I
10.1109/TCSVT.2005.858742
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A visible watermark may convey ownership information that identifies the originator of image and video. A potential application scenario for visible watermarks was proposed by IBM where an image is originally embedded with a visible watermark before posting on the web for free observation and download. The watermarked image which serves as a "teaser." The watermark can be removed to recreate the unmarked image by request of interested buyers. Before we can design an algorithm for satisfying this application, three basic problems should be solved. First, we need to find a strategy suitable for producing large amount of visually same but numerically different watermarked versions of the image for different users. Second, the algorithm should let the embedding parameters reachable for any legal user to make the embedding process invertible. Third, an unauthorized user should be prevented from removing the embedded watermark pattern. In this letter, we propose a user-key-dependent removable visible watermarking system (RVWS). The user key structure decides both the embedded subset of watermark and the host information adopted for adaptive embedding. The neighbor-dependent embedder adjusts the marking strength to host features and makes unauthorized removal very difficult. With correct user keys, watermark removal can be accomplished in "informed detection" and the high quality unmarked image can be restored. In contrast, unauthorized operation either overly or insufficiently removes the watermark due to wrong estimation of embedding parameters, and thus, the resulting image has apparent defect.
引用
收藏
页码:129 / 133
页数:5
相关论文
共 14 条
[1]   Reversible watermark using the difference expansion of a generalized integer transform [J].
Alattar, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (08) :1147-1156
[2]  
[Anonymous], 1997, D LIB MAGAZINE
[3]   Protecting publicly-available images with a visible image watermark [J].
Braudaway, GW ;
Magerlein, KA ;
Mintzer, F .
OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES, 1996, 2659 :126-133
[4]   Circular interpretation of bijective transformations in lossless watermarking for media asset management [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (01) :97-105
[5]   Invertible authentication [J].
Fridrich, J ;
Gojan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :197-208
[6]  
HONSINGER CW, 1999, Patent No. 77102ED
[7]   Wavelet domain adaptive visible watermarking [J].
Hu, YJ ;
Kwong, S .
ELECTRONICS LETTERS, 2001, 37 (20) :1219-1220
[8]  
HU YJ, 2003, LNCS, V2939, P86
[9]  
Meng JH, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P474, DOI 10.1109/ICIP.1998.723534
[10]  
Mohanty SP, 2000, 2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, P1029, DOI 10.1109/ICME.2000.871535