The Community for Technology Leaders
RSS Icon
Issue No.01 - January/February (1999 vol.19)
pp: 18-24
Digital watermarks have been proposed to protect legal owners from piracy--illegal copying and retransmission. However, many research problems remain open, and watermarking techniques are themselves vulnerable to piracy. This article collects fundamental watermarking concepts and offers a general watermarking framework for protecting the copyright of digital products. Registration of watermarked products is proposed for developing a trustworthy overall protection system.
George Voyatzis, Ionnis Pitas, "Protecting Digital-Image Copyrights: A Framework", IEEE Computer Graphics and Applications, vol.19, no. 1, pp. 18-24, January/February 1999, doi:10.1109/38.736465
1. B.M. Macq and J.-J. Quisquater, Cryptology for Digital TV Broadcasting Proc. IEEE, vol. 83, no. 6, pp. 944-957, 1995.
2. D.R. Stinson, Cryptography: Theory and Practice. Boca Raton, Fla.: CRC Press, 1995.
3. T. ElGamal, A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
4. Special issue on watermarking, Signal Processing, Vol. 66, No. 3, May 1998.
5. Special issue, IEEE J Selected Areas in Comm., Vol. 16, No. 4, 1998.
6. N.F. Johnson and S. Jacodia, "Exploring Steganography: Seeing the Unseen," Computer, Vol. 31, No. 2, Feb. 1998, pp. 26-34.
7. W. Bender, D. Gruhl, and N. Morimoto, "Techniques for Data Hiding," Proc. SPIE, Vol. 2420, SPIE, Bellingham, Wash., 1995, p. 40.
8. E. Koch and J. Zhao, "Towards Robust and Hidden Image Copyright Labeling," Proc. IEEE Workshop on Nonlinear Signal and Image Processing, IEEE, 1995, pp. 452-455.
9. I. Cox et al., "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image Processing, Vol. 6, No. 12, Dec. 1997, pp. 1673-1687 (originally published in 1995 as NEC TR 95-10).
10. I. Pitas and T.H. Kaskalis, "Applying Signatures on Digital Images," Proc. IEEE Workshop on Nonlinear Signal and Image Processing, IEEE, 1995, pp. 460-463.
11. L. Qiao and K. Nahrstedt, "Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights," to be published in J. Image Comm. and Image Representation, 1998.
12. D. Kundur and D. Hatzinakos, "A Robust Digital Image Watermarking Method Using Wavelet-Based Fusion," Proc. ICIP 97, Vol. I, 1997, pp. 544-547.
13. J.J.K. Ruanaidh and T. Pun, "Rotation, Scale, and Translation Invariant Spead Spectrum Digital Image Watermarking," Signal Processing, Vol. 66, No. 3, 1998, pp. 303-317.
14. G. Voyatzis and I. Pitas, "Chaotic Watermarks for Embedding in the Spatial Digital Image Domain," Proc. ICIP 98, IEEE, 1998, pp. 432-438.
15. J.F. Delaigle, C. De Vleeschouwer, and B. Macq, "Watermarking Algorithm Based on a Human Visual Model," Signal Processing, Vol. 66, No. 3, 1998, pp. 337-355.
16. C.I. Podilchuk and W. Zeng, "Image-Adaptive Watermarking Using Visual Models," IEEE J. Selected Areas in Communications, vol. 16, no. 4, May 1998, pp. 525-539.
17. F.A. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Attacks on Copyright Marking Systems," Information Hiding: Second Int'l Workshop, Vol. 1525of LNCS, Springer-Verlag, Berlin, 1998, pp. 219-239.
18. S. Craver et al., "Resolving Rightful Ownership with Invisible Watermarking Techniques: Limitations, Attacks, and Implications," IEEE J. Selected Areas in Comm., vol. 4, no. 16, May 1998, pp. 573-586.
19. I.J. Cox and J.P. Linnartz, "Some General Methods for Tampering with Watermarks," IEEE J. Selected Areas Comm., vol. 16, no. 4, May 1998, pp. 587-593.
20. T. Davis, Adopting a Policy of Reuse IEEE Spectrum, pp. 44-48, June 1994.
23 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool