Digital watermarking: Algorithms and applications

被引:444
作者
Podilchuk, CI
Delp, EJ
机构
[1] Bell Labs, Murray Hill, NJ 07974 USA
[2] Purdue Univ, W Lafayette, IN 47907 USA
关键词
D O I
10.1109/79.939835
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Digital watermarking algorithms for audio, still images, graphics and text were proposed. The applications of robust digital watermarking in copyright protection, authentication, temper detection and data hiding were discussed. The watermark signal was embedded into perceptually insignificant portion of host data to develop an imperceptible watermark. It was found that in digital watermarking each copy gets a unique watermark to identify the end users. The analysis suggested that combination of all weak narrowband signals at the demodulator helped to recover the original information signal.
引用
收藏
页码:33 / 46
页数:14
相关论文
共 82 条
[1]  
[Anonymous], P INT C IM PROC THES
[2]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[3]  
BLOOM J, 1999, P IEEE, P12667
[4]  
Boland F. M., 1995, IEEE INT C IM P ITS, P321
[5]   Digital watermarks for audio signals [J].
Boney, L ;
Tewfik, AH ;
Hamdy, KN .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, 1996, :473-480
[6]  
Bors AG, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P231, DOI 10.1109/ICIP.1996.560426
[7]  
BRASSIL J, 1994, IEEE INFOCOM SER, P1278, DOI 10.1109/INFCOM.1994.337544
[8]   ELECTRONIC MARKING AND IDENTIFICATION TECHNIQUES TO DISCOURAGE DOCUMENT COPYING [J].
BRASSIL, JT ;
LOW, S ;
MAXEMCHUK, NF ;
OGORMAN, L .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1995, 13 (08) :1495-1504
[9]   Copyright protection for the electronic distribution of text documents [J].
Brassil, JT ;
Low, S ;
Maxemchuk, NF .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1181-1196
[10]   Protecting publicly-available images with a visible image watermark [J].
Braudaway, GW ;
Magerlein, KA ;
Mintzer, F .
OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES, 1996, 2659 :126-133