The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
Communications of the ACM
Cryptographic copyright protection for digital images based on watermarking techniques
Theoretical Computer Science - Special issue: cryptography
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Information hiding: steganography, attacks, and countermeasures
Information hiding: steganography, attacks, and countermeasures
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
IEEE Transactions on Image Processing
Optimal differential energy watermarking of DCT encoded images and video
IEEE Transactions on Image Processing
A block oriented fingerprinting scheme in relational database
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.00 |
In this paper we present an invisible spatial domain watermarking technique. The technique divides the image into n small blocks and the intensity of some of these blocks are modified depending on the key, which is a secret random binary string of length m n. Given an attacked image, the recovery process generates a bit pattern of length m and we show that from this pattern it is possible to get back the exact key using either standard correlation measure or error correcting codes. The recovery process employs window matching technique on the attacked image, which has been found to work successfully. Our method can survive common image transformations and intentional attacks both in spatial and frequency domain. Most importantly, it also survives the nonlinear geometric attacks, e.g., Stirmark. To the best of our knowledge, here we experiment with an exhaustive set of attacks which has not been provided elsewhere.