Figure 5 - uploaded by Jean-Jacques Quisquater
Content may be subject to copyright.
Invisibility veriication for (a) Lena, (b) Demi, (c) Boat: (1) original picture, (2) watermarked picture.

Invisibility veriication for (a) Lena, (b) Demi, (c) Boat: (1) original picture, (2) watermarked picture.

Source publication
Article
Full-text available
This paper presents an additive watermarking technique for grey scale pictures, which can be extended to video sequences. It consists of embedding secretly a copyright information (a binary code) in the picture without degrading its quality. Those bits are encoded through the phase of Maximal Length Sequences (MLS). MLS are sequences having good co...

Citations

... The current focus in algorithm development has involved improving robustness primarily through the use of sophisticated perceptual models [5]- [7], interference and attack modeling for advanced detector design [8]- [10], appropriate transform domains for superior modulation [11]- [13], and powerful errorcorrection codes [14]. ...
... The fold hardware accumulates the filtered results into a matrix (the fold buffer). 5 Then, the fft, pwm, ifft, and scan blocks sequentially operate on the fold buffer to detect and extract any payload. At any one step in the detection process, only one of the computational blocks (fft, pwm, ifft, or scan) is actively operating on the contents of the shared fold buffer; this is enforced by the multiplexor at the input of the fold buffer that selects the currently active path into the buffer. ...
... Due to the shared fold buffer in the architecture, pixels cannot be processed by fold while the fold buffer is being used by the fft, ifft, and pwm operations; this blockage must be compensated for by properly sizing the input FIFO. The total duration during which pixels cannot be processed is (4) and the incoming pixel rate is (5) Hence, to ensure real-time performance, the input FIFO must be large enough to buffer pixels. Alternatively, rather than buffering the pixels, they could simply be dropped. ...
Article
Full-text available
We consider hardware implementation aspects of the digital watermarking problem through the implementation of a well-known video watermarking algorithm called just another watermarking system (JAWS); we discuss the time and area constraints that must be satisfied by a successful hardware implementation. A hardware architecture that implements the algorithm under the constraints is then proposed. The architecture is analyzed to gain an understanding of the relationships between algorithmic features and implementation cost. Some general findings of this work that can be applied toward making algorithmic developments more amenable to hardware implementation are finally presented.
... Pseudorandom Minimum Length (ML) sequences have already been used in many watermarking embedding systems in the spatial domain [4], [5]. It has been shown that they have good correlation properties and a good trade-off between the probability of error in detection, the power of the watermark and the amount of information that can be inserted. ...
Article
This work concentrates on the problem of watermarking embedding and blind optimum detection in full-frame DCT domain using channel-state knowledge concepts. Minimum length sequences are used to embed the watermark information in the color components. Each chip of the sequence is inserted in a random-like fashion in those coefficients that ensure imperceptibility, robustness and a very low probability of error in detection. As it will be shown the power of the watermark has to be distributed among the symbols not only considering imperceptibility but also to improve the detection process. Furthermore, two solutions are proposed to improve the robustness against cropping operations.
... The watermark system described in [2] was successfully applied to grey scale images and could be easily extended to color images by embedding the watermark in the luminance component. Actually this strategy for color images is often used in the literature. ...
... Second, visual quality of the marked image should be indistinguishable from the original. The contribution in [2] is a pioneering work on the use of luminance psychovisual criteria in the watermark embedding process, by modeling the behavior of human visual system with Gabor filters. On the other hand the S-CIELAB system is an extension of CIELAB which is based on psychophysical studies of color discriminability and takes spatial structure also into account [3]. ...
Conference Paper
This work concentrates on the problem of watermarking embedding and optimum detection in color images through the use of spread spectrum techniques both in space (Direct Sequence Spread Spectrum or DSSS) and frequency (Frequency Hopping). It is applied to RGB and opponent color component representations Perceptive information is considered in both color systems. Some tests are performed in order to ensure imperceptibility and to assess detection quality of the optimum color detectors
... Extensions to this method allow increased robustness and even watermark recovery after geometrical attacks and printing-scanning [26]. Macq et al. introduced watermarking adapted to the human visual system (HVS) using masking and modulation [14, 15]. In their scheme, the watermark in the form of a spatially limited binary pattern is low-pass filtered, frequency modulated, masked, and then added to the host image. ...
Article
The objective of this thesis is to present a robust watermarking algorithm for H.264 and to address challenges in compressed-domain video watermarking. To embed a perceptually invisible watermark in highly compressed H.264 video, we use a human visual model. We extend Watson's human visual model developed for 8x8 DCT block to the 4x4 block used in H.264. In addition, we use P-frames to increase the watermark payload. The challenge in embedding the watermark in P-frames is that the video bit rate can increase significantly. By using the structure of the encoder, we significantly reduce the increase in video bit rate due to watermarking. Our method also exploits both temporal and texture masking. We build a theoretical framework for watermark detection using a likelihood ratio test. This framework is used to develop two different video watermark detection algorithms; one detects the watermark only from watermarked coefficients and one detects the watermark from all the ac coefficients in the video. These algorithms can be used in different video watermark detection applications where the detector knows and does not know the precise location of watermarked coefficients. Both watermark detection schemes obtain video watermark detection with controllable detection performance. Furthermore, control of the detector's performance lies completely with the detector and does not place any burden on the watermark embedding system. Therefore, if the video has been attacked, the detector can maintain the same detection performance by using more frames to obtain its detection response. This is not the case with images, since there is a limited number of coefficients that can be watermarked in each image before the watermark is visible. Ph.D. Committee Chair: Mersereau, Russell; Committee Member: Jayant, Nikil; Committee Member: Lanterman, Aaron; Committee Member: McLaughlin, Steven; Committee Member: Rossignac, Jarek
Article
This paper presents a video watermarking technology for broadcast monitoring. The technology has been developed at the Philips Research Laboratories in Eindhoven in the context of the European ESPRIT project VIVA Visual Identity V eriication Auditor. The aim of the VIVA project is to investigate and demonstrate a professional broadcast surveillance system. The key technology in the VIVA project is a new video watermarking technique by the name of JAWS Just Another Watermarking System. The JAWS system has been developed such that the embedded watermarks i are invisible, ii are robust with respect to all common processing steps in the broadcast transmission chain, iii have a v ery low probability of false alarms, iv have a large payload at high rate, and v allow for a low complexity and a real-time detection. In this paper we present the basic ingredients of the JAWS technology. We also brieey discuss the performance of JAWS with respect to the requirements of broadcast monitoring.
Conference Paper
This paper proposes a novel blind logo multi-resolution watermarking technique based on independent component analysis (ICA) for extraction. To exploit the human visual system (HVS) and the robustness, a perceptual model is applied with a stochastic approach based on noise visibility function (NVF) for adaptive watermarking algorithm. A logo watermark is embedded by modifying middle-frequency sub-bands of wavelet transform. The new detection technique based on ICA is introduced during the extraction phase to ensure a blind watermark. The proposed algorithm is checked for the robustness to several compression algorithms such as Jpeg, jpeg 2000, SPIHT, EZW, and principal components analysis (PCA) based compression and also robust against various image and digital processing operators.
Conference Paper
One of the problems arising from the use of digital media is the ease of obtaining identical copies of digital images or audio files, allowing manipulation and unauthorized use. Copyright is an effective tool for preserving intellectual property of those documents but authors and publishers need effective techniques preventing copyright modification, due to the straightforward access to multimedia applications and the wider use of digital publications through the WWW. These techniques are generally called watermarking and allow the introduction of side information (i.e. author identification, copyrights, dates, etc.). This work concentrates on the problem of watermarking embedding and optimum detection in color images through the use of spread spectrum techniques, both in space (direct sequence spread spectrum or DSSS) and frequency (frequency hopping). It is applied to RGB and opponent color component representations. Perceptive information is considered in both color systems. Some tests are performed in order to ensure imperceptibility and to assess detection quality of the optimum color detectors
Article
Full-text available
With the advances in networked multimedia technology, reproduction of multimedia data has become easier. This has created a need for the copyright protection of the data.
Article
A robust watermarking scheme for hiding binary or gray-scale watermarks in digital images is proposed in this chapter. Motivated by the fact that a detector response (a correlation value) only provides a soft evidence for convincing jury in courtroom, embedded watermarks are designed to be visually recognizable after retrieval. To strengthen the existence confidence of a watermark, visually significant transformed components are selected. In addition, a relocation technique is presented to tackle geometric-distortionbased attacks without using any registration scheme. Finally, a semi-public watermark detector which does not require use of the original source is proposed for the purpose of authentication. Experimental results demonstrate that our approach satisfies the common requirements of image watermarking, and that the performance is superb. Keywords: Human visual system Wavelet transform Watermarking Modulation Attacks Corresponding author 1 1 INTRODUCTION 1.1 WATERMA...