𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Cryptographic copyright protection for digital images based on watermarking techniques

✍ Scribed by Joseph Ó Ruanaidh; Holger Petersen; Alexander Herrigel; Shelby Pereira; Thierry Pun


Publisher
Elsevier Science
Year
1999
Tongue
English
Weight
413 KB
Volume
226
Category
Article
ISSN
0304-3975

No coin nor oath required. For personal study only.

✦ Synopsis


In this paper we present a new approach for the secure and robust copyright protection of digital images. We describe a system for generating digital watermarks and for trading watermarked images. The system is based on a new watermarking technique, which is robust against image transformation techniques such as compression, rotation, translation, scaling and cropping. It uses modulation of the magnitude components in Fourier space to embed a watermark and an accompanying template and, during watermark extraction, reads a template in the log polar transform of the frequency domain. The template is used for analyzing scaling and rotation su ered by the watermarked stego-image. The detection of the watermarks is also possible without any need for the original cover-image. In addition, the system applies asymmetric cryptographic protocols for di erent purposes, namely embedding=detecting the watermark and transferring watermarked data. The public key technique is applied for the construction of a oneway watermark embedding and the veriÿcation function to identify and prove the uniqueness of the watermark. Legal dispute resolution is supported for the multiple watermarking of a digital image without revealing the conÿdential keying information.


📜 SIMILAR VOLUMES


An ID-based digital watermarking protoco
✍ Peng Zeng; Zhenfu Cao; Kim-Kwang Raymond Choo 📂 Article 📅 2011 🏛 Elsevier Science 🌐 English ⚖ 337 KB

Digital watermarking techniques are a means of protecting the copyrights of digital contents. In this paper, we propose an identity-based (ID-based) digital watermarking protocol and point out several previously unpublished flaws in Hwang et al. ( 2005)'s scheme. We hope that by identifying the desi