This Article 
 Bibliographic References 
 Add to: 
Digital Watermarking: From Concepts to Real-Time Video Applications
January/February 1999 (vol. 19 no. 1)
pp. 25-35
This article provides a brief overview of digital watermarking. It defines the requirements for a secure and robust watermarking algorithm for use in applications such as intellectual property rights protection, and gives an application example for digital streaming MPEG-2 format video watermarking. MPEG-2 is the format of choice for the broadcast and video stock industry and therefore must be used as the foundation for a serious video watermarking application.

1. A. Tirkel et al., "Electronic Watermark," Digital Image Computing, Technology and Applications—DICTA 93, Maquarie University, Sidney, 1993, pp. 666-673.
2. I. Cox et al., "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image Processing, Vol. 6, No. 12, Dec. 1997, pp. 1673-1687 (originally published in 1995 as NEC TR 95-10).
3. I. Pitas and T.H. Kaskalis, "Applying Signatures on Digital Images," IEEE Workshop on Nonlinear Image and Signal Processing, IEEE Computer Society Press, Los Alamitos, Calif., 1995, pp. 460-463.
4. E. Koch and J. Zhao, "Towards Robust and Hidden Image Copyright Labeling," Proc. 1995 IEEE Workshop on Nonlinear Signal and Image Processing, IEEE Computer Society Press, Los Alamitos, Calif., 1995, pp. 452-455.
5. I. Cox and M. Miller, "A Review of Watermarking and the Importance of Perceptual Modeling," Human Vision and Electrtonic Imaging II, No. 3016, Society of Photo-Optical Instrumentation Engineers (SPIE), Bellingham, Wash., 1997, pp. 92-99.
6. Low et Al., "Document Marking and Identification Using Both Line and Word Shifting," Infocom 95, IEEE Computer Society Press, Los Alamitos, Calif., 1995.
7. B. Schneier, Applied Cryptography, 2nd edition, John Wiley&Sons, New York, 1996.
8. A. Kerckhoffs, "La Cryptographic Militaire," J. des Sciences Militaire, Ninth Series, Feb. 1883, pp. 161-191.
9. K. Rao and J.J. Hwang, Techniques&Standards for Image, Video and Audio Coding, Ch. 11, Prentice Hall, Upper Saddle River, N.J., 1996, pp. 273-322.
10. F.A. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Attacks on Copyright Marking Systems," Information Hiding: Second Int'l Workshop, Vol. 1525of LNCS, Springer-Verlag, Berlin, 1998, pp. 219-239.
11. S. Wolthusen, "On the Limitations of Digital Watermarks: A Cautionary Note," Proc. of World Multiconference on Systemics, Cybernetics, and Informatics (SCI 98)/Int'l Conf. on Information Systems Analysis and Synthesis (ISAS 98), Vol. 4, Int'l Institute of Informatics and Systemics (IIIS), July 1998.
12. U. Reimers, "Concept of a European System for the Transmission of Digitized Television Signals via Satellite," SMPTE J., Vol. 103, No. 11, 1994, pp. 741-747.
13. Talisman Project, 1998,
14. J. Dittmann, M. Stabenau, and R. Steinmetz, "Robust MPEG Video Watermarking Technologies," ACM Multimedia 98, ACM Press, New York, 1998, pp. 71-80.
15. F. Hartung and B. Girod, "Digital Watermarking of Raw and Compressed Video," Proc. SPIE 2952: Digital Compression Technologies and Systems for Video Communication, Society of Photo-Optical Instrumentation Engineers (SPIE), Bellingham, Wash., 1996, pp. 205-213.
16. L. Qiao and K. Nahrstedt, "Watermarking Methods for MPEG Encoded Video: Toward Resolving Rightful Ownership," IEEE Multimedia Computing and Systems Conf., IEEE Computer Society Press, Los Alamitos, Calif., 1998.
17. S. Mallat and W. Hwang, "Singularity Detection and Processing with Wavelets," IEEE Trans. on Information Theory, Vol. 38, No. 2, IEEE Computer Society Press, Los Alamitos, Calif., 1992.
18. D. Benham et al., "Fast Watermarking of DCT-based Compressed Images," Proc. Int'l Conf. on Imaging Science, Systems, and Applications, CSREA Press, Athens, Ga., 1997.

Christoph Busch, Wolfgang Funk, Stephen Wolthusen, "Digital Watermarking: From Concepts to Real-Time Video Applications," IEEE Computer Graphics and Applications, vol. 19, no. 1, pp. 25-35, Jan.-Feb. 1999, doi:10.1109/38.736466
Usage of this product signifies your acceptance of the Terms of Use.