Browse > Article
http://dx.doi.org/10.3745/KIPSTD.2003.10D.2.309

A Robust Image Watermarking Algorithm and System Architecture for Semi-fingerprinting  

Joung, Gil-Ho (성균관대학교 대학원 전기전자 및 컴퓨터공학과)
Lee, Han-Ho (㈜마크애니연구소)
Eom, Young-Ik (성균관대학교 정보통신공학부)
Abstract
In this paper, we propose a new watermarking method based on spread spectrum and a semi-fingerprinting system architecture that can be built using our robust watermarking method. Especially, we describe a method that extends the application area of watermarking technology to more practical application domains by applying the watermarking technology that has been focused mainly on copyright protection to fingerprinting area. Our proposed watermarking scheme uses the method that inserts more data by using random number shifting method. We improved the reliability of acquired data with 20-bits CRC code and 60-bits inserted information. In addition, we designed the system architecture based on the recommendation of cIDf (content ID forum) in order to apply the system on the semi-fingerprinting area.
Keywords
Watermark; Fingerprint; Steganography;
Citations & Related Records
연도 인용수 순위
  • Reference
1 I. J. Cox, M. L. Miller and J. A. Bloom, 'Watermarking applications and their properties,' International Conference Information technology, '2000, Las Vegas, 2000   DOI
2 D. F. Josep and H. J. Jordi, 'Simple Collusion-Secure Fingerprinting Schemes for Images,' IEEE ITCC '2000, pp. 128-132, 2000   DOI
3 J. J. K. O'Ruanaidh and T. Pun, 'Rotation, Scale and Translation Invariant Digital Image Watermarking,' Signal Processing Journal, 1998   DOI   ScienceOn
4 J. Dittmann, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk and J. Ueberberg, 'Combining digital Watermarks and collusion secure Fingerprints for digital Images,' IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents, SPIE, San Jose, California, Vol.3675, Jan., 1999
5 A. E. Caldwell, H. J. Choi and A. B. Kahng, 'Effective Iterative Technique for Fingerprinting Design IP,' 36th ACM/IEEE Design Automation Conference Proceedings, pp. 843-848, Jun., 1999   DOI
6 C. Y. Lin, 'Public Watermarking Surviving General Scaling and Cropping : An Application for Print-and-Scan Process,' ACM Multimedia '99, Orlando, FL, USA, Oct., 1999
7 C. Y. Lin and S. F. Chang, 'Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process,' ISMIP '99, Taipei, Taiwan, Dec., 1999
8 R. Caldelli, M. Barni, F. Bartolini and A. Piva, 'GEOMETRIC-INVARIANT ROBUST WATERMARKING THROUGH CONSTELLATION MATCHING IN THE REQUQENCY DOMAIN,' Proceedings of 7th IEEE ICIP 2000, Vol.II, pp.65-68, Vancouver, Canada, Sep., 2000   DOI
9 C. R. Choi and J. Jeong, 'Robust Image Watermarking Scheme Resilient to Desynchronization Attacks,' SPIE 2002 Security and Watermarking of Multimedia Contents IV, San Jose, USA, Jan., 2002   DOI
10 J. K. Su and B. Girod, 'On the Robustness and Imperceptibility of Digital Fingerprints,' ICMCS'99, Florence, Italy, Vol.2, pp.530-535, Jun., 1999   DOI
11 F. A. P. Petitcolas and R. J. Anderson, 'Evaluation of copyright marking systems,' In proceedings of IEEE Multimedia Systems '99, Florene, Italy, Vol.1, pp.574-579, June, 1999   DOI
12 I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' NEC Res. Insti., Princeton, NJ, Tech. Rep.95-10, 1995
13 T. Kalker, G. Depovere, J. Haitsma and M. Maes, 'A Video Wartermarking System for Broadcast Monitoring,' IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents, SPIE, San Jose, California, Vol.3675, Jan., 1999