Image Watermarking

Image Watermarking

Nikos Tsirakis (University of Patras, Greece)
Copyright: © 2009 |Pages: 15
DOI: 10.4018/978-1-60566-118-6.ch003
OnDemand PDF Download:
$37.50

Abstract

This chapter describes image watermarking, the most common and widespread category of media files are images. The evolution of the Internet and the ease by which images can be duplicated and distributed has led to the need for effective copyright protection tools and techniques in order to provide a secure way to the producers and the owners of these media files. These techniques are described below with an introduction to information hiding. Various software products have been introduced with an aim to address these growing concerns; some categories are presented here. The fundamental technique which allows an individual to add hidden copyright notices or other verification messages to digital images is called digital image watermarking and constitutes the main part of the chapter. Finally authors provide future trends and directions of image watermarking.
Chapter Preview
Top

History Of Information Hiding

In this section we are going to give some important landmarks about information hiding without intending to cover the whole history of it. Information hiding techniques belong to a wide category of techniques that try to embed a signal, called digital signature or copyright label or watermark in the initial data. These techniques combine many different scientific areas like cryptography, digital signal processing, communication theory, etc. Generally there are two basic methods of information hiding, cryptography and steganography which overlap in some cases because they share some techniques.

Cryptography is about protecting the content of a message with the use of disguise. The initial message is called the plain text and the disguised message is called the cipher text. The process of converting this plain text to a cipher text is called enciphering or in other words encryption. The opposite process is called deciphering or decryption. Encryption protects content during the transmission of the data from the sender to receiver. However, after receipt and subsequent decryption, the data is no longer protected and is clear. While cryptography is about protecting the content of messages, steganography is about concealing their very existence.

Steganography lies in devising astute and undetectable methods of concealing the message themselves. It comes from Greek roots (στεγανός, γραφείν), literally meaning «covered writing» (Clarendon Press, 1933), and is usually interpreted to mean hiding information in other information. Examples include sending a message to a spy by marking certain letters in a newspaper using invisible ink. Steganography hides messages in plain sight rather than encrypting the message. It is embedded in the data and does not require secret transmission. A whole other branch of steganography is linguistic steganography which consists of linguistic or language forms of hidden writing (David Kahn, 1996).

There has been a growing interest, by different research communities, in the fields of steganography, digital watermarking and fingerprinting. This led to some confusion in the terminology. For this reason in Figure 1 we present a classification of various information hiding techniques.

Figure 1.

A classification of information hiding techniques (Based on Birgit Pfitzmann, 1996)

Complete Chapter List

Search this Book:
Reset
List of Reviewers
Table of Contents
Foreword
Athanasios Skodras
Acknowledgment
Dimitrios Tsolis, Lambros Drossos, Spyros Sioutas, Theodore Papatheodorou
Chapter 1
Alfredo M. Ronchi
“Creativity is one of the highest forms of human energy. It is a defining human trait that enables us to design and use tools, while giving us the... Sample PDF
Intellectual Property Rights
$37.50
Chapter 2
Ioannis Kostopoulos
This chapter highlights the need for using copyright protection tools in our digital transactions. The main tools of copyright protection, such as... Sample PDF
Digital Rights Management: A New Trend or a Necessity
$37.50
Chapter 3
Image Watermarking  (pages 56-70)
Nikos Tsirakis
This chapter describes image watermarking, the most common and widespread category of media files are images. The evolution of the Internet and the... Sample PDF
Image Watermarking
$37.50
Chapter 4
Alessandro Piva, Roberto Caldelli, Alessia De Rosa, Mauro Barni, Vito Cappellini
The need to safeguard the property rights of multimedia content from unauthorized copying and the possibility to determine the true owners of the... Sample PDF
Watermarking Techniques for DRM Applications
$37.50
Chapter 5
V. E. Fotopoulos, I. D. Kostopoulos
This chapter introduces JPEG 2000 as an application field for image authentication and the new technology of digital image watermarking. The new... Sample PDF
Watermarking and Authentication in JPEG2000
$37.50
Chapter 6
Evanthia Tsilichristou
The basic principle of watermarking is the addition of the watermark signal to the host data that we wish to watermark. The addition is taking place... Sample PDF
Securing and Protecting the Copyright of Digital Video Through Watermarking Technologies
$37.50
Chapter 7
Nikos Nikolaidis
Intellectual property rights protection and management of multimedia data is essential for the deployment of e-commerce systems involving... Sample PDF
Digital Rights Management of Images and Videos Using Robust Replica Detection Techniques
$37.50
Chapter 8
Shiguo Lian
In this chapter, the digital fingerprinting technology that is used to trace illegal distributors in multimedia content distribution is... Sample PDF
Digital Fingerprinting Based Multimedia Content Distribution
$37.50
Chapter 9
Tom S. Chan
While delivering content via the Internet can be efficient and economical, content owners risk losing control of their intellectual property. Any... Sample PDF
A Digital Rights Management System for Educational Content Distribution
$37.50
Chapter 10
Dimitrios P. Meidanis
This chapter investigates intellectual property rights clearance of as part of e-commerce. Rights clearance is viewed as another online transaction... Sample PDF
Digital Rights Management and E-Commerce Transactions: Online Rights Clearance
$37.50
Chapter 11
Dimitra Pappa, Lefteris G. Gortzis
With emerging technologies constantly creating new possibilities for organisations to manage their information resources, this chapter proposes a... Sample PDF
Digital Rights Management in Organisations: A Critical Consideration with a Socio-Technical Approach
$37.50
Chapter 12
Georgios Stilios, Dimitrios K. Tsolis
The issue addressed in this chapter is the design, implementation, and evaluation of a watermarking application, especially focused on the... Sample PDF
An Advanced Watermarking Application for the Copyright Protection and Management of Digital Images of Cultural Heritage Case Study: “Ulysses”
$37.50
Chapter 13
Andrea de Polo
Digital Rights Management (DRM) describes a set of functionalities which control access to, and the use of, copyright material. In particular, they... Sample PDF
Digital Rights Management in the Cultural Heritage Arena: A Truth or a Myth
$37.50
Chapter 14
Christos Golfinopoulos
The purpose of this chapter is to provide a brief overview of the legal framework that applies to Digital Rights Management (DRM) information and... Sample PDF
Digital Rights Management: A European Law Perspective
$37.50
Chapter 15
Vagelis Papakonstantinou
DRM systems have been implemented in the past few years by the Content Industry as the panacea against all copyright (and Intellectual Property... Sample PDF
Legal Issues for DRM: The Future
$37.50
About the Contributors