Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1022431.1022462acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Key-dependency for a wavelet-based blind watermarking algorithm

Published: 20 September 2004 Publication History

Abstract

When a host image is watermarked multiple times by the same algorithm collisions can occur. This makes it difficult for an image to host multiple watermarks. But this hosting is necessary for an image distribution chain, where several persons all watermark the same image. Wavelet domain transformations provide several possibilities to customize the transformation process. We discuss the applicability of the methods of wavelet filter parametrization and wavelet packet decomposition for secret watermark embedding on the algorithm of Dugad et al. We conclude that filter parametrization is not suited while wavelet packet decomposition shows good results.

References

[1]
I. Daubechies. Ten Lectures on Wavelets. Number 61 in CBMS-NSF Series in Applied Mathematics. SIAM Press, Philadelphia, PA, USA, 1992.
[2]
W. Dietl, P. Meerwald, and A. Uhl. Key-dependent pyramidal wavelet domains for secure watermark embedding. In E. J. Delp and P. W. Wong, editors, Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 728--739, Santa Clara, CA, USA, Jan. 2003. SPIE.
[3]
W. Dietl, P. Meerwald, and A. Uhl. Protection of wavelet-based watermarking systems using filter parametrization. Signal Processing (Special Issue on Security of Data Hiding Technologies), 83:2095--2116, 2003.
[4]
W. Dietl and A. Uhl. Watermark security via secret wavelet packet subband structures. In A. Lioy and D. Mazzocchi, editors, Communications and Multimedia Security. Proceedings of the Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, volume 2828 of Lecture Notes on Computer Science, pages 214--225, Turin, Italy, Oct. 2003. Springer-Verlag.
[5]
W. M. Dietl and A. Uhl. Robustness against unauthorized watermark removal attacks via key-dependent wavelet packet subband structures. In Proceedings of the IEEE International Conference on Multimedia and Expo, ICME '04, Taipei, Taiwan, June 2004. To appear.
[6]
R. Dugad, K. Ratakonda, and N. Ahuja. A new wavelet-based scheme for watermarking images. In Proceedings of the IEEE International Conference on Image Processing (ICIP'98), Chicago, IL, USA, Oct. 1998.
[7]
J. R. Kim and Y. S. Moon. A robust wavelet-based digital watermark using level-adaptive thresholding. In Proceedings of the IEEE International Conference on Image Processing (ICIP'99), page 202, Kobe, Japan, Oct. 1999.
[8]
P. Meerwald and A. Uhl. Watermark security via wavelet filter parametrization.
[9]
F. C. Mintzer and G. W. Braudaway. If one watermark is good, are more better? In Proceedings of the 1999 International Conference on Acoustics, Speech and Signal Processing (ICASSP'99), volume 4, pages 2067--2070, Phoenix, AZ, USA, Mar. 1999.
[10]
J. Schneid and S. Pittner. On the parametrization of the coefficients of dilation equations for compactly supported wavelets. Computing, 51:165--173, May 1993.
[11]
N. P. Sheppard, R. Safavi-Naini, and P. Ogunbona. On multiple watermarking. In Proceedings of the 9th ACM Multimedia 2001 Conference, pages 3--6, Ottawa, Ontario, Canada, Sept. 2001.
[12]
H.-J. Wang and C.-C. J. Kuo. Watermark design for embedded wavelet image codec. In Proceedings of the SPIE's 43rd Annual Meeting, Applications of Digital Image Processing, volume 3460, pages 388--398, San Diego, CA, USA, July 1998.
[13]
M. Wickerhauser. Adapted wavelet analysis from theory to software. A.K. Peters, Wellesley, Mass., 1994.
[14]
X.-G. Xia, C. G. Boncelet, and G. R. Arce. Wavelet transform based watermark for digital images. Optics Express, 3(12):497, Dec. 1998.
[15]
H. Zou and A. H. Tewfik. Parametrization of compactly supported orthonormal wavelets. IEEE Transactions on Signal Processing, 41(3):1423--1431, Mar. 1993.

Cited By

View all
  • (2018)The secure wavelet transformJournal of Real-Time Image Processing10.1007/s11554-010-0165-67:2(131-142)Online publication date: 19-Dec-2018
  • (2014)Feature Analysis of Blind Watermarked Electromyogram Signal in Wireless TelemonitoringConcepts and Trends in Healthcare Information Systems10.1007/978-3-319-06844-2_13(205-229)Online publication date: 26-Sep-2014
  • (2013)An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters2013 International Conference on Advances in Technology and Engineering (ICATE)10.1109/ICAdTE.2013.6524732(1-5)Online publication date: Jan-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '04: Proceedings of the 2004 workshop on Multimedia and security
September 2004
236 pages
ISBN:1581138547
DOI:10.1145/1022431
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. blind watermarking
  2. multiple watermarking
  3. parameterized wavelet filters
  4. wavelet packets

Qualifiers

  • Article

Conference

MM&Sec '04
Sponsor:
MM&Sec '04: Multimedia and Security Workshop 2004
September 20 - 21, 2004
Magdeburg, Germany

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)The secure wavelet transformJournal of Real-Time Image Processing10.1007/s11554-010-0165-67:2(131-142)Online publication date: 19-Dec-2018
  • (2014)Feature Analysis of Blind Watermarked Electromyogram Signal in Wireless TelemonitoringConcepts and Trends in Healthcare Information Systems10.1007/978-3-319-06844-2_13(205-229)Online publication date: 26-Sep-2014
  • (2013)An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters2013 International Conference on Advances in Technology and Engineering (ICATE)10.1109/ICAdTE.2013.6524732(1-5)Online publication date: Jan-2013
  • (2013)The Secure Wavelet TransformEmbedded Multimedia Security Systems10.1007/978-1-4471-4459-5_5(67-89)Online publication date: 2013
  • (2010)A Reconfigurable Architecture for Secure Multimedia DeliveryProceedings of the 2010 23rd International Conference on VLSI Design10.1109/VLSI.Design.2010.50(258-263)Online publication date: 3-Jan-2010
  • (2009)An Efficient Hardware Architecture for Multimedia Encryption and Authentication Using the Discrete Wavelet TransformProceedings of the 2009 IEEE Computer Society Annual Symposium on VLSI10.1109/ISVLSI.2009.26(85-90)Online publication date: 13-May-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media