System Architecture Analysis of a Hybrid Watermarking Method | SpringerLink
Skip to main content

System Architecture Analysis of a Hybrid Watermarking Method

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3682))

Abstract

A hybrid watermark that consists of a robust part and a fragile part can be used to serve multiple purposes. The robust part can protect copyright information, the fragile part can detect tampering, and their combination enables identification of attacks encountered. This paper analyses an overlap and a non-overlap implementation of the robust and fragile parts in a hybrid system. The difference between the two implementation methods lies in the robust and fragile watermarks embedding positions. Embedding capacity, computational costs, watermark robustness, and tamper detection localization of the two implementations are analyzed. In addition, optimization issues of block size in the hybrid system are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Fridrich, J.: A hybrid watermark for tamper detection in digital images. In: Proceedings of the Fifth International Symposium on Signal Processing and Its Applications (ISSPA 1999), August 22-25, vol. 1, pp. 301–304 (1999)

    Google Scholar 

  2. Deguillaume, F., Voloshynovskiy, S., Pun, T.: Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Processing 83, 2133–2170 (2003)

    Article  MATH  Google Scholar 

  3. Woo, C.-S., Du, J., Pham, B.: Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images. In: APRS Workshop on Digital Image Computing (WDIC2005), Brisbane, Australia, February 21, pp. 43–48 (2005)

    Google Scholar 

  4. Deguillaume, F., Voloshynovskiy, S., Pun, T.: Method for the estimation and recovering of general affine transforms in digital watermarking applications. In: IS& T/SPIE’s 14th Annual Symposium, Electronic Imaging 2002: Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, January 20-25, vol. 4675, pp. 313–322 (2002)

    Google Scholar 

  5. Voloshynovskiy, S., Deguillaume, F., Pun, T.: Multibit digital watermarking robust against local nonlinear geometrical distortions. In: IEEE International Conference on Image Processing (ICIP2001), Thessaloniki, Greece, October 2001, pp. 999–1002 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Woo, CS., Du, J., Pham, B., Abdulkadir, H.A. (2005). System Architecture Analysis of a Hybrid Watermarking Method. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_158

Download citation

  • DOI: https://doi.org/10.1007/11552451_158

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28895-4

  • Online ISBN: 978-3-540-31986-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics