Academia.eduAcademia.edu

Invisible Watermarking

description36 papers
group8 followers
lightbulbAbout this topic
Invisible watermarking is a digital data embedding technique that conceals information within a digital medium, such as images or audio, without perceptibly altering its appearance or quality. This method is used for copyright protection, authentication, and data tracking, ensuring that the embedded information remains undetectable to the casual observer.
lightbulbAbout this topic
Invisible watermarking is a digital data embedding technique that conceals information within a digital medium, such as images or audio, without perceptibly altering its appearance or quality. This method is used for copyright protection, authentication, and data tracking, ensuring that the embedded information remains undetectable to the casual observer.

Key research themes

1. How can robustness and imperceptibility be balanced in digital image watermarking to protect multimedia content?

This theme addresses the ongoing research efforts to achieve a trade-off between watermark imperceptibility (transparency), robustness against various signal processing attacks (compression, filtering, geometric distortions), and data payload in image watermarking. Robust watermarking ensures watermark survival through common operations, thus protecting copyright and authenticity, whereas imperceptibility maintains visual quality. This balance is critical given conflicting requirements and evolving multimedia distribution environments.

Key finding: This 2021 review highlights that the three core requirements of digital image watermarking—robustness, imperceptibility, and security—are often in conflict: increasing robustness typically degrades perceptual quality and vice... Read more
Key finding: This 2015 comprehensive survey discusses the properties critical to watermarking systems, such as embedding effectiveness (robustness), imperceptibility, capacity, and computational cost. It underscores that increasing... Read more
Key finding: This 2013 work designs a watermarking framework embedding grayscale watermarks into the luminance channel of color host images using blockwise DCT and quantization, aiming to improve robustness against JPEG compression. The... Read more
Key finding: This 2016 study proposes a spatial domain color image watermarking algorithm that spreads watermark information across pixel regions to emulate transform domain robustness, incorporating color compensation masks for... Read more

2. What are effective methods for lossless and reversible watermark embedding enabling original image recovery?

This theme explores techniques of reversible (lossless) watermarking, where the original image can be perfectly restored after watermark extraction. Such methods are critical in sensitive domains like medical imaging and forensics where exact recovery is mandatory. It includes reversible visible watermarking techniques using deterministic reversible mappings and compound mappings to embed visible watermarks with guaranteed image restoration.

Key finding: This paper introduces a novel generic visible watermarking approach based on deterministic, one-to-one reversible compound mappings of image pixel values. The method allows embedding various watermark types (opaque... Read more
Key finding: This work reviews fragile and semi-fragile authentication watermarking specifically for binary images, highlighting the challenges due to lack of least significant bits and quantization indices. It emphasizes the necessity of... Read more
Key finding: The paper also innovates in embedding visible watermarks that are reversible, overcoming the limitation of prior binary-only reversible visible watermarking methods by supporting colorful watermarks, thus broadening... Read more

3. How can watermarking protocols leverage watermark embedding and extraction for effective digital copyright protection?

This theme addresses the design and use of watermarking protocols that integrate watermark embedding with legal and technical ownership enforcement mechanisms. Research in this area investigates watermark-based buyer-seller interaction models, identification of copyright violators via watermark extraction, robustness of protocols in adversarial environments, and the balance between user privacy and content protection.

Key finding: This 2023 paper systematizes foundational concepts and requirements in watermarking protocols, especially buyer-seller models, emphasizing how embedded watermarks can serve as proof of ownership and deter illegal... Read more
Key finding: This chapter provides an extensive review of digital watermarking in multimedia copyright contexts, explaining how watermarks persist through copying and enable ownership proof. It discusses integration with cryptography and... Read more
Key finding: The paper proposes an invisible robust watermarking scheme that creates a compound watermark by embedding a user logo into a statistically synthesized image from a perceptually important image sub-region, which is then... Read more

All papers in Invisible Watermarking

Abstract— In This Paper we are going to purpose an efficient Watermarking Technique for Digital Media Content Protection and Copyright Protection. Watermarking is a technique to embed hidden and unnoticeable signal into digital media in... more
This study introduces an advanced method for evaluating non-blind watermarking quality, leveraging both visible and invisible watermarking techniques grounded in principles of discrete cosine transform (DCT) and modified singular value... more
Three-dimensional (3D) printing opens up new possibilities in customization and manufacturing, but brings with it tremendous intellectual property vulnerabilities, including financially motivated knockoffs and intentional sabotage. Novel... more
Transform domain methods have dominated the watermarking field from its early stages. In these methods some coefficients are selected and modified according to certain rules. The two most important numbers in this process are the length... more
Abstract— In This Paper we are going to purpose an efficient Watermarking Technique for Digital Media Content Protection and Copyright Protection. Watermarking is a technique to embed hidden and unnoticeable signal into digital media in... more
Ownership authentication and copyright protection of image has achieved a sharp attention due to easy and global availability of internet services. Illegal copying and misappropriation of digital image leads cyber crime in an epidemic... more
A novel approach for adaptive visible watermarking algorithm using Hadamard transformation technique is proposed in this paper for copyright protection of digital images. In this work, watermark is inserted into luminance component of a... more
We present a patented apparatus which consists of an extreme ultraviolet radiation source writing invisible patterns on thin tags of alkali halides. The tags written using this method are almost impossible to counterfeit, and offer a much... more
Abstract— In This Paper we are going to purpose an efficient Watermarking Technique for Digital Media Content Protection and Copyright Protection. Watermarking is a technique to embed hidden and unnoticeable signal into digital media in... more
The growth of high speed computer networks and that of the Internet, in particular, has hiked the ease of Information Communication as well as the fear of getting it snooped at the same time. So, Information Security is becoming an... more
Ownership authentication and copyright protection of image has achieved a sharp attention due to easy and global availability of internet services. Illegal copying and misappropriation of digital image leads cyber crime in an epidemic... more
We present a patented apparatus which consists of an extreme ultraviolet radiation source writing invisible patterns on thin tags of alkali halides. The tags written using this method are almost impossible to counterfeit, and offer a much... more
In this paper, a new robust watermarking scheme is presented. The algorithm is based on a chaotic function and a correlation method for detection, operating in the frequency domain. The proposed scheme is blind and comparing to other... more
In this paper, a new robust watermarking scheme is presented. The algorithm is based on a chaotic function and a correlation method for detection, operating in the frequency domain. The proposed scheme is blind and comparing to other... more
Abstract— In This Paper we are going to purpose an efficient Watermarking Technique for Digital Media Content Protection and Copyright Protection. Watermarking is a technique to embed hidden and unnoticeable signal into digital media in... more
The possibility of adding several watermarks to the same image would enable any interesting applications such as multimedia document tracing, data usage monitoring, Multiple property management. In this paper, we present a watermarking... more
The paper focuses on the counterfeiting of travel documents by identifying the safety elements. In this purpose, there are presented both new materials and manufacturing procedures of theses documents and the actual procedures of... more
We present a patented apparatus which consists of an extreme ultraviolet radiation source writing invisible patterns on thin tags of alkali halides. The tags written using this method are almost impossible to counterfeit, and offer a much... more
Transform domain methods have dominated the watermarking field from its early stages. In these methods some coefficients are selected and modified according to certain rules. The two most important numbers in this process are the length... more
Difference expansion (DE) has been widely used for reversible data hiding. In this work, a new DE based scheme is presented that uses consecutive, overlapping pairs, instead of the non-overlapping pairs or triads used by traditional DE... more
Most of the methods involved in transform domain watermarking perform very well in a great variety of attacks but fail miserably in the category of the attacks known as geometrical. Usually, even a small rotation or slight zoom in/out of... more
A great number of digital watermarking approaches do exist, but it seems that transform domain watermarking dominates the field. The detection of such schemes is based on thresholds extracted by statistic rules on which the method relies.... more
The wide use of digital media during the past few years, has led to an increase of digital piracy and tampering. To deal with these problems, the concept of watermarking has been introduced. The image is being altered and depending on the... more
In this paper, a new robust watermarking scheme is presented. The algorithm is based on a chaotic function and a correlation method for detection, operating in the frequency domain. The proposed scheme is blind and comparing to other... more
This work is about a data hiding technique based on the modification of the image histogram. It is fully reversible, that means, the original image can be recovered from the marked image, after the hidden data has been extracted. The... more
This report is about a data hiding technique based on the modification of the image histogram. It is fully reversible, that means, the original image can be recovered from the marked image, after the hidden data has been extracted. The... more
The main objective of the study was to determine the factors affecting control of counterfeit products in Kenya, with specific reference to the Anti Counterfeit Agency. The specific objectives were to establish the effects of staff... more
Piracy in terms of digital multimedia may be defined as snooping or plagiarism of video, audio or text. Although digital data have many advantages over analogue data, the rightful ownership of the digital data source is at of risk. The... more
Difference expansion (DE) has been widely used for reversible data hiding. In this work, a new DE based scheme is presented that uses consecutive, overlapping pairs, instead of the non-overlapping pairs or triads used by traditional DE... more
This work is about a data hiding technique based on the modification of the image histogram. It is fully reversible, that means, the original image can be recovered from the marked image, after the hidden data has been extracted. The... more
This work is about a data hiding technique based on the modification of the image histogram. It is fully reversible, that means, the original image can be recovered from the marked image, after the hidden data has been extracted. The... more
In the past decade internet worked perfectly with distribution of the digital data for pictures, music and videos. Although digital data have many advantages over analogue data, the rightful ownership of the digital data source is at of... more
The emergence and proliferation of email, mobile communication devices, internet chatrooms, shared virtual environments, advanced tele-conferencing platforms and other telecommunication systems underline the importance of developing... more
We present a patented apparatus which consists of an extreme ultraviolet radiation source writing invisible patterns on thin tags of alkali halides. The tags written using this method are almost impossible to counterfeit, and offer a much... more
The Watermarking techniques represent actually a very important issue in digital multimedia content distribution. To protect digital multimedia content we embed an invisible watermark into images which facilitate the detection of... more
Most of the methods involved in transform domain watermarking perform very well in a great variety of attacks but fail miserably in the category of the attacks known as geometrical. Usually, even a small rotation or slight zoom in/out of... more
The wide use of digital media during the past few years, has led to an increase of digital piracy and tampering. To deal with these problems, the concept of watermarking has been introduced. The image is being altered and depending on the... more
In the paper, the effects of the imminent JPEG2000 compression standard on watermarking techniques are investigated. It is shown that the choice of different coding parameters affects the performance of transform domain watermarking... more
This work is about a data hiding technique based on the modification of the image histogram. It is fully reversible, that means, the original image can be recovered from the marked image, after the hidden data has been extracted. The... more
Difference expansion (DE) has been widely used for reversible data hiding. In this work, a new DE based scheme is presented that uses consecutive, overlapping pairs, instead of the non-overlapping pairs or triads used by traditional DE... more
A great number of digital watermarking approaches do exist, but it seems that transform domain watermarking dominates the field. The detection of such schemes is based on thresholds extracted by statistic rules on which the method relies.... more
Transform domain methods have dominated the watermarking field from its early stages. In these methods some coefficients are selected and modified according to certain rules. The two most important numbers in this process are the length... more
L’OCSE in un rapporto del 2007 ha stimato un volume di beni contraffatti nel mercato internazionale del valore di circa 200 miliardi di dollari (vedi http://www.oecd.org/dataoecd/13/12/38707619.pdf). C’è quindi la necessità di sviluppare... more
We present a recently patented apparatus which consists of an extreme ultraviolet radiation source writing invisible patterns on thin tags of alkali halides. The tags patterned using this method are almost impossible to counterfeit, and... more
"LE TECNICHE DI TRATTAMENTO A LIVELLO NANOMETRICO POSSONO ESSERE UTILIZZATE IN SVARIATI SETTORI APPLICATIVI, NON NECESSARIAMENTE SOLO DI COMPONENTISTICA INDUSTRIALE. ESISTONO, PER ESEMPIO, INTERESSANTI APPLICAZIONI NELL’AGROALIMENTARE,... more
We present a patented apparatus which consists of an extreme ultraviolet radiation source writing invisible patterns on thin tags of alkali halides. The tags written using this method are almost impossible to counterfeit, and offer a much... more
Abstract–In this work, a new blind watermarking scheme in frequency domain is presented. The proposed scheme is based on a chaotic function for embedding, and a correlation method for detection. Three-dimensional maps of PSNR and... more
ABSTRACT The wide use of digital media during the past few years, has led to an increase of digital piracy and tampering. To deal with these problems, the concept of watermarking has been introduced. The image is being altered and... more
Abstract In this paper, a new reversible watermarking scheme resistant to geometrical attacks is presented. The proposed scheme does not need the original image for extracting the watermark, and induces not noticeable distortion during... more
Download research papers for free!