Spatial domain digital watermarking of multimedia objects for buyer authentication

被引:81
作者
Mukherjee, DP [1 ]
Maitra, S
Acton, ST
机构
[1] Indian Stat Inst, Elect & Commun Sci Unit, Kolkata 700108, W Bengal, India
[2] Indian Stat Inst, Comp & Stat Serv Ctr, Kolkata 700108, W Bengal, India
[3] Univ Virginia, Dept Elect & Comp Engn, Charlottesville, VA 22094 USA
基金
美国国家科学基金会;
关键词
buyer key; digital watermarking; error correcting code; image key;
D O I
10.1109/TMM.2003.819759
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing watermarking processes become vulnerable when the attacker knows the watermark insertion algorithm. This paper presents an invisible spatial domain watermark insertion algorithm for which we show that the watermark can be recovered even if the attacker tries to manipulate the watermark with the knowledge of the watermarking process. The process incorporates buyer specific watermarks within a single multimedia object, and the same multimedia object has different watermarks that differ from owner to owner. Therefore recovery of this watermark not only authenticates the particular owner of the multimedia object but also could be used to identify the buyer involved in the forging process. This is achieved after spatially dividing the multimedia signal randomly into a set of disjoint subsets (referred to as the image key) and then manipulating the intensity of these subsets differently depending on a buyer specific key. These buyer specific keys are generated using a secret permutation of error correcting codes so that exact keys are not known even with the knowledge of the error correcting scheme. During recovery process a manipulated buyer key (due to attack) is extracted from the knowledge of, the image key. The recovered buyer key is matched with the exact buyer key in the database utilizing the principles of error correction. The survival of the watermark is demonstrated for a wide range of transformations and forging attempts on multimedia objects both in spatial and frequency domains. We have shown that quantitatively our watermarking survives rewatermarking attack using the knowledge of the watermarking process more efficiently compared to a spread spectrum based technique. The efficacy of the process increases in scenarios in which there exist fewer numbers of buyer keys for a specific multimedia object. We have also shown that a minor variation of the watermark insertion process can survive a "Stirmark" attack. By making the image key and the intensity manipulation process specific for a buyer and with proper selection of error correcting codes, certain categories of collusion attacks can also be precluded.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 17 条
[1]  
CACHIN C, 1998, 2 WORKSH INF HID POR
[2]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[3]  
COX IJ, 1997, EL IM 97 FEB
[4]  
Craver S, 1998, COMMUN ACM, V41, P44, DOI 10.1145/278476.278486
[5]  
Ergun F, 1999, LECT NOTES COMPUT SC, V1592, P140
[6]  
GONZALEZ RC, 1988, DIGITAL IMAGE PROCES, P16
[7]   DCT-domain watermarking techniques for still images:: Detector performance analysis and a new structure [J].
Hernández, JR ;
Amado, M ;
Pérez-González, F .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (01) :55-68
[8]  
HONSINGER C, DATA EMBEDDING USING
[9]  
JOHNSON NF, 2000, INFORMATION HIDING S
[10]   Optimal differential energy watermarking of DCT encoded images and video [J].
Langelaar, GC ;
Lagendijk, RL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (01) :148-158