IBM Systems Journal
Communications of the ACM
Journal of VLSI Signal Processing Systems - Special issue on multimedia signal processing
Quantization effects on digital watermarks
Signal Processing
An image watermarking technique using pyramid transform
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
Digital watermarking
Cryptography: Theory and Practice
Cryptography: Theory and Practice
A secure code for recipient watermarking against conspiracy attacks by all users
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
DCT-based watermark recovering without resorting to the uncorrupted original image
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Watermarking applications and their properties
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Cocktail watermarking for digital image protection
IEEE Transactions on Multimedia
IEEE Transactions on Information Theory
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Multiresolution scene-based video watermarking using perceptual models
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Rotation, scale, and translation resilient watermarking for images
IEEE Transactions on Image Processing
Multiresolution watermarking for images and video
IEEE Transactions on Circuits and Systems for Video Technology
Jointly Verifying Ownership of an Image Using Digital Watermarking
Multimedia Tools and Applications
A light weight buyer-seller watermarking protocol
Advances in Multimedia
An improved watermarking technique for multi-user, multi-right environments
Multimedia Tools and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A novel framework for multiple creatorship protection of digital movies
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Hi-index | 0.00 |
Though many image watermarking schemes have been proposed, none of them can resolve the problem of joint ownership. This paper proposes two novel algorithms that make use of a secret sharing scheme in cryptography to address this problem. The first one applies Shamir's (2, 2) threshold scheme to the watermarking algorithm. A watermark, which is a gaussian distributed random vector determined by two keys, is embedded to selected coefficients in all middle bands in the wavelet domain of an image, so that only when the two keys are put together can the ownership be verified. The second algorithm is a modification of the first one. Three random watermarks are embedded to middle bands in the wavelet domain of an image. For the watermark detection, two thresholds are set, so the watermark detector can verify partial ownership as well as full ownership. Experimental results show that both algorithms have the desired properties such as invisibility, reliable detection and robustness against a wide range of imaging processing operations.