IBM Systems Journal
Opportunities for watermarking standards
Communications of the ACM
Communications of the ACM
Journal of VLSI Signal Processing Systems - Special issue on multimedia signal processing
Quantization effects on digital watermarks
Signal Processing
An image watermarking technique using pyramid transform
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
Digital watermarking
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Digital image watermarking for joint ownership
Proceedings of the tenth ACM international conference on Multimedia
DCT-based watermark recovering without resorting to the uncorrupted original image
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Watermarking applications and their properties
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Efficient secret sharing without a mutually trusted authority
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Cocktail watermarking for digital image protection
IEEE Transactions on Multimedia
IEEE Transactions on Information Theory
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Multiresolution scene-based video watermarking using perceptual models
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
IEEE Transactions on Image Processing
Rotation, scale, and translation resilient watermarking for images
IEEE Transactions on Image Processing
Multiresolution watermarking for images and video
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
The current image watermarking schemes only involve one key, thus can not resolve the problem of joint ownership. This paper proposes two totally new algorithms that make use of a secret sharing scheme in cryptography to address this problem. The first one applies Shamir's (2,2) threshold scheme to the watermarking algorithm. A watermark, which is a gaussian distributed random vector determined by two keys, is embedded to selected coefficients in all middle bands in the wavelet domain of an image, so that only when the two keys are put together can the ownership be verified. The second algorithm is a modification of the first one. Three random watermarks are embedded to middle bands in the wavelet domain of an image. For the watermark detection, two thresholds are set, so the watermark detector can verify partial ownership as well as full ownership. Experimental results show that both algorithms have the desired properties such as invisibility, reliable detection and robustness against a wide range of imaging processing operations.