The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Frequency Domain Watermarking: An Overview

,

With rapid growth in computer network and information technology, a large number of copyrighted works now exist digitally as a computer files, and electronic publishing is becoming more popular. These improvements in computer technology increase the problems associated with copyright enforcement and thus future developments of networked multimedia systems are conditioned by the development of efficient methods to protect ownership rights against unauthorized copying and redistribution. Digital watermarking has recently emerged as a candidate to solve this difficult problem. In the first part of this paper we introduces an overview to digital watermarking: The general framework, its main applications, the most important properties, the main aspects used to classify watermarking, and we discuss the attacks that watermarking system may face. Finally we introduce human visual system and its interaction with watermarking as well as some open problems in digital watermarking. In the second part we introduces an overview of watermarking in frequency domain. The general properties for frequency domain as well as specific properties for each sub-domain are introduced. The sub-domains considered are discrete cosine domain, discrete wavelet domain and discrete Fourier domain. We also introduce some different watermarking techniques in each category.

 


[1] Alattar A., “Smart Images Using Digimarc’s Watermarking Technology,” Digimarc Corporation in Proceedings of the 12th International Symposium on Electrnic Imaging (SPIE), vol. 3971, no. 25, 2000.

[2] Anderson R. J. and Petitcolas F., “On the Limits of Steganography,” IEEE Journal of Selected Areas in Communications, vol. 16, pp. 474-481, May 1998.

[3] Barni M., Bartolini F., Cappellini V., and Piva A., “A DCT-Domain System for Robust Image Watermarking,” Signal Processing (EURASIP), vol. 66, no. 3, pp. 357-372, May 1998.

[4] Barni M., Bartolini F., Cappellini V., Lippi A., and Piva A., “A DWT-Based Technique for Spatio-Frequency Masking of Digital Signatures,” in Wong and Delp (Eds.), San Jose, California, vol. 3657, pp. 31-39, 1999.

[5] Bors A. and Pitas I., “Image Watermarking Using Block Site Selection and D. C. T. Domain Constraints,” Optics Express, vol. 3, no. 12, pp. 512-523, December 1998.

[6] Chae J. J. and Manjunath B. S., “A Technique for Image Data Hiding and Reconstruction without Host Image,” in Wong and Delp (Eds), San Jose, California, vol. 3657, pp. 386-396, 1999.

[7] Cox I. J. and Miller M. L., “A Review of Watermarking and the Importance of Perceptual 46 The International Arab Journal of Information Technology, Vol. 2, No. 1, January 2005 Modeling,” SPIE, Human Vision & Electronic Imaging II, vol. 3016, pp. 92-99, 1997.

[8] Cox I. J., Kilian J., Leighton T., and Shamoon T., “A Secure, Robust Watermark for Multimedia,” in Proceedings of the 1st International Workshop on Information Hiding, pp. 183-206, 1996.

[9] Cox I. J., Miller M. L., and Bloom J. A., Digital Watermarking, Morgan Kaufmann Publishers, 2002.

[10] Craver S., Yeo B. L., and Yeung M., “Technical Trails and Legal Tribulations,” Communications of the ACM, vol. 41, no. 7, pp. 44-54, July 1998.

[11] Ferril E. and Moyer M., “A Survey of Digital Watermarking,” http://elizabeth.ferrill.com, 1999.

[12] Gonzalez R. C. and Woods R. E., Digital Image Processing, Reading, Prentice Hall, 2002.

[13] Hannigan B. T., Reed A., and Bradley B., “Digital Watermarking Using Improved Human Visual System Model,” in Proceedings of the SPIE, Digimarc Corporation, vol. 4314, pp. 468- 474, 2001.

[14] Herrigel A., O’Ruanaidh J., Petersen H., Pererira S., and Pun T., “Secure Copyright Protection Techniques for Digital Images,” in Information Hiding, Aucsmith D. (Ed.), of Lecture Notes in Computer Science, Berlin, Springer-Verlag, vol. 1525, pp. 169-190, 1998.

[15] Hsu C. T. and Ling J., “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, USA, vol. 8, no. 1, pp. 58-68, January 1999.

[16] Inoue H., Katsura T., Miyazaki A., and Yamamoto A., “A Digital Watermark Technique Based on the Wavelet Transform and its Robustness on Image Compression and Transformation,” IEICE Transactions on Fundamentals of Electronics, vol. E82-A, no. 1, pp. 2-10, January 1999.

[17] Johnston J., Jayant N., and Safranek R., “Signal Compression Based on Models of Human Perception,” in Proceedings of the IEEE, vol. 81, no. 10, pp.1385-1422, October 1993.

[18] Kankanhalli M. and Ramakrishnan R., “Content Based Watermarking of Images,” in Proceedings of the 6th ACM International Multimedia Conference, Bristol, England, pp. 61-70, September 1998.

[19] Katzenbeisser S. and Petitcolas F., Information Hiding Techniques for Steganography and Digital Watermarking, Boston, Artech House, 2000.

[20] Kim W. G., Lee J. C., and Lee W. D., “An Image Watermarking Scheme with Hidden Signature,” IEEE Proceeding of the International Conference on Image Processing, Japan, pp. 206-210, October 1999.

[21] Kundur D. and Hatzinakos D., “A Robust Digital Image Watermarking Method Using Wavelet- Based Fusion,” in Proceedings of the International Conference on Image Processing, IEEE, California, USA, pp. 544-547, October 1997.

[22] Kundur D. and Hatzinakos D., “Digital Watermarking Using Multi-Resolution Wavelet Decomposition,” in Proceeding of the IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 6, pp. 2969-2972, 1998.

[23] Levine M. D., Vision in Man and Machine, McGraw-Hill, Toronto, 1985.

[24] Lewis A. S. and Knowles G., “Image Compression Using the 2-D Wavelet Transform,” IEEE Transactions Image Processing, vol. 1, pp. 240-250, April 1992.

[25] Lin C. Y., Wu M., Bloom J. A., Cox I. J, Miller M. L., and Lui Y. M., “Rotation, Scale, and Translation Resilient Public Watermarking for Images,” in Security and Watermarking of Multimedia Contents II, in Wong and Delp (Eds.), in Proceedings of the SPIE, vol. 3971, pp. 90-98, 2000.

[26] Lumini A. and Maio D., “A Wavelet-Based Image Watermarking Scheme,” in Proceedings of the IEEE International Conference on Information Technology: Coding and Computing, pp. 122-127, March 2000.

[27] Mintzer F., Lotspiech J., and Morimoto N., “Safeguarding Digital Library Contents and Users,” D-Lib Magazine, December 1997.

[28] Ó Ruanaidh J. J. K. and Pun T., “Rotation, Scale, and Translation Invariant Spread Spectrum Digital Image Watermarking,” Signal Processing (EURASIP), vol. 66, no. 3, pp. 303-317, May 1998.

[29] O’ Ruanaidh J. J. K., Dowling W. J., and Boland F. M., “Phase Watermarking of Digital Images,” in Proceedings of the IEEE International Conference on Image Processing, vol. 3, pp. 239- 242, September 1996.

[30] O’ Ruanaidh J. J. K., Dowling W. J., and Boland F. M., “Watermarking Digital Images for Copyright Protection,” IEE Proceedings on Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, August 1996.

[31] Ohnishi J. and Matsui K., “Embedding a Seal into a Picture Under Orthogonal Wavelet Transform,” in Proceedings of the International Conference on Multimedia Computing and Systems, pp. 514-521, June 1996.

[32] Petitcolas F., Anderson R., and Kuhn M., “Attacks on Copyright Marking Systems,” in Proceedings of the Information Hiding: 2nd International Workshop, vol. 1525, pp. 218-238. Frequency Domain Watermarking: An Overview 47

[33] Petitcolas F., Anderson R., and Kuhn M., “Information Hiding: A Survey,” IEEE, vol. 87, no. 7, pp. 1062-1077, 1999.

[34] Pfitzmann B., “Information Hiding Terminology,” in Proceedings of the 1st International Workshop on Information Hiding, pp. 347-350, 1996.

[35] Raymound H., Chan F., and Yeung K. M., “A Frequency Domain Watermarking Scheme,” January 2001.

[36] Shoapiro J. M., “Embedded Image Coding Using Zerotrees of Wavelet Coefficients,” IEEE Transactions Signal Processing, vol. 41, no. 12, pp. 3445-3462, 1993.

[37] Solachidis V. and Pitas I., “Circularly Symmetric Watermark Embedding in 2-D DFT Domain,” in Proceedings of the International Conference on Acoustics, Speech and Signal Processing, IEEE Signal Processing Society, Phoenix, Arizona, USA, pp. 1653-1656, March 1999.

[38] Swanson M. D., Zhu B., and Tewfik A. H., “Transparent Robust Image Watermarking,” in Proceedings of the International Conference on Image Processing, IEEE, vol. 3, pp. 211-214, 1996.

[39] Tao B. and Dickenson B., “Adaptive Watermarking in the DCT Domain,” in Proceedings of the International Conference on Acoustics and Signal Processing, 1997.

[40] Xia X. G., Boncelet C. G., and Arce G. R., “A Multi-Resolution Watermark for Digital Images,” in Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp. 548- 551, October 1997.

[41] Zaho J. and Koch E., “Embedding Robust Labels into Images for Copyright Protection,” in Proceedings of the International Conference on Intellectual Property Rights for Information, Knowledge and New Techniques, Munchen, Wien, Oldenbourg Verlag, pp. 242-251, 1995. Khaled Mahmoud received his BSc and MSc degree in computer science from the University of Jordan. Currently, he is a lecturer in the Department of Computer Science at Zarqa Private University, Jordan, and working in his PhD thesis at Loughborough University, UK. His research is in print security and watermarking. Sekharjit Datta received his BSc degree from the University of Calcutta and the MSc and PhD degrees from the University of London. He spent twenty years in industrial research relating to information technology and advanced signal processing, at the Research and Advanced Development Centre of International Computers Ltd, UK, where he worked as a senior research consultant. He became a member of academic staff at Loughborough University in 1987. His research activities have concentrated on various aspects of advanced signal processing. He has specific expertise in the areas of speech, image, bio-acoustic signal processing, and pattern recognition. He has authored/ co-authored over 130 publications in refereed journals and international conference proceedings. James Flint is a lecturer in wireless systems engineering at Loughborough University, UK. He gained a PhD in electronic and electrical engineering for work on efficient electromagnetic modelling of vehicles and was subsequently employed in the Research Department of MIRA Ltd, UK as a project engineer. His current research is in the area of applied signal processing and includes the modelling of novel transducers and the design of high- integrity processors for automotive applications. He is a member of IEEE and IEE, UK, and is a chartered engineer.