skip to main content
article
Free Access

The first 50 years of electronic watermarking

Published:01 January 2002Publication History
Skip Abstract Section

Abstract

Electronic watermarking can be traced back as far as 1954. The last 10 years has seen considerable interest in digital watermarking, due, in large part, to concerns about illegal piracy of copyrighted content. In this paper, we consider the following questions: is the interest warranted? What are the commercial applications of the technology? What scientific progress has been made in the last 10 years? What are the most exciting areas for research? And where might the next 10 years take us? In our opinion, the interest in watermarking is appropriate. However, we expect that copyright applications will be overshadowed by applications such as broadcast monitoring, authentication, and tracking content distributed within corporations. We further see a variety of applications emerging that add value to media, such as annotation and linking content to the Web. These latter applications may turn out to be the most compelling. Considerable progress has been made toward enabling these applications-perceptual modelling, security threats and countermeasures, and the development of a bag of tricks for efficient implementations. Further progress is needed in methods for handling geometric and temporal distortions. We expect other exciting developments to arise from research in informed watermarking.

References

  1. {1} E. F. Hembrooke, "Identification of sound and like signals," United States Patent, 3,004,104, 1961.Google ScholarGoogle Scholar
  2. {2} W. M. Tomberlin, L. G. MacKenzie, and P. K. Bennett, "System for transmitting and receiving coded entertainment programs," United States Patent, 2,630,525, 1953.Google ScholarGoogle Scholar
  3. {3} C. Walker, "Personal communications," June 2001, Muzak Corporation.Google ScholarGoogle Scholar
  4. {4} W. E. Noller, "Inband signalling system,"United States Patent, 3,061,783, 1962.Google ScholarGoogle Scholar
  5. {5} R. H. Baer, "Digital video modulation and demodulation system," United States Patent, 3,993,861, 1976.Google ScholarGoogle Scholar
  6. {6} R. Dolby, "Apparatus and method for the identification of specially encoded FM stereophonic broadcasts," United States Patent, 4,281,217, 1981.Google ScholarGoogle Scholar
  7. {7} R. S. Broughton and W. C. Laumeister, "Interactive video method and apparatus," United States Patent, 4,807,031, 1989.Google ScholarGoogle Scholar
  8. {8} D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," in Advances in Cryptology-Crypto '95, vol. 963 of Lecture Notes in Computer Science, pp. 452-465, Springer-Verlag, Berlin, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. {9} H. S. Stone, "Analysis of attacks on image watermarks with randomized coefficients," Technical report TR 96-045, NEC Research Institute, Princeton, NJ, USA, May 1996.Google ScholarGoogle Scholar
  10. {10} J. Kilian, T. Leighton, L. R. Matheson, T. Shamoon, and R. E. Tarjan, "Resistance of watermarked documents to collusional attacks," Technical report TR 97-167, NEC Research Institute, Princeton, NJ, USA, 1997.Google ScholarGoogle Scholar
  11. {11} S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, "Can invisible watermarks resolve rightful ownerships?," IBM Technical Report RC 20509, IBM Research, July 1996, in IBM Cyber Journal, http://www.research.ibm.com.Google ScholarGoogle Scholar
  12. {12} J. P. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. 2nd Int. Workshop on Information Hiding, pp. 258-272, Portland, Ore, USA, April 1998.Google ScholarGoogle ScholarCross RefCross Ref
  13. {13} I. J. Cox and J.-P. M. G. Linnartz, "Some general methods for tampering with watermarks," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 587-593, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. {14} M. Goljan, J. Fridrich, and R. Du, "Distortion-free data embedding for images," in Proc. 4th Int. Workshop on Information Hiding, pp. 27-41, Pittsburgh, Pa, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. {15} W. F. Schreiber, E. H. Adelson, A. B. Lippman, et al., "A compatible high-definition television system using the noise-margin method of hiding enhancement information," SMPTE Journal, vol. 98, no. 12, pp. 873-879, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  16. {16} H. C. Papadopoulos and C.-E. W. Sundberg, "Simultaneous broadcasting of analog FM and digital audio signals by means of adaptive precanceling techniques," IEEE Trans. Communications , vol. 46, no. 9, pp. 1233-1242, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  17. {17} B. Chen and C.-E. W. Sundberg, "Digital audio broadcasting in the FM band by means of contiguous band insertion and precancelling techniques," IEEE Trans. Communications, vol. 48, no. 10, pp. 1634-1637, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  18. {18} M. van der Veen, W. Oomen, F. Bruekers, J. Haitsma, T. Kalker, and A. N. Lemma, "Robust, multi-functional, and high quality audio watermarking technology," in 110th Audio Engineering Society Convention, vol. 5345, Amsterdam, The Netherlands, May 2001.Google ScholarGoogle Scholar
  19. {19} D. Kirovski and H. S. Malvar, "Robust covert communication over a public audio channel using spread spectrum," in Information Hiding Workshop, I. S. Moskowitz and J. McHugh, Eds., pp. 354-368, Pittsburgh, Pa, USA, April 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. {20} I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proceedings of the IEEE, vol. 87, no. 7, pp. 1127-1141, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  21. {21} J. Chou, S. S. Pradhan, and K. Ramchandran, "On the duality between data hiding and distributed source coding," in Proc. Annual Asilomar Conf. Signals, Systems, and Computers, vol. 2, pp. 1503-1507, Pacific Grove, Calif, USA, November 1999.Google ScholarGoogle Scholar
  22. {22} B. Chen and G. W. Wornell, "An information-theoretic approach to the design of robust digital watermarking systems," in Proc. Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), vol. 4, pp. 2061-2064, Phoenix, Ariz, USA, March 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. {23} C. E. Shannon, "Channels with side information at the transmitter," IBM J. Res. Develop., vol. 6, no. 2, pp. 3630-3633, 1958.Google ScholarGoogle Scholar
  24. {24} M. L. Miller, I. J. Cox, and J. A. Bloom, "Informed embedding: exploiting image and detector information during watermark insertion," in Proc. IEEE International Conference on Image Processing, vol. 3, pp. 1-4, September 2000.Google ScholarGoogle ScholarCross RefCross Ref
  25. {25} J. Chou, S. Pradhan, L. El Ghaoui, and K. Ramchandran, "Watermarking based on duality with distributed source coding and robust optimization principles," in Proc. IEEE International Conference on Image Processing, vol. 1, pp. 585-588, Vancouver, Canada, September 2000.Google ScholarGoogle Scholar
  26. {26} B. Chen and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," in Proc. IEEE International Symposium on Information Theory (ISIT-2000), p. 46, Sorrento, Italy, June 2000.Google ScholarGoogle ScholarCross RefCross Ref
  27. {27} P. Moulin and J. O'Sullivan, "Information-theoretic analysis of information hiding," in Proc. ICASSP '00, Istanbul, Turkey, 2000.Google ScholarGoogle Scholar
  28. {28} M. H. M. Costa, "Writing on dirty paper," IEEE Transactions on Information Theory, vol. 29, no. 3, pp. 439-441, 1983.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. {29} I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," Technical report 9510, NEC Research Institute, Princeton, NJ, USA, 1995.Google ScholarGoogle Scholar
  30. {30} C. Podilchuk and W. Zeng, "Image-adaptive watermarking using visual models," IEEE Journal on Selected Areas in Communications , vol. 16, no. 4, pp. 525-539, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. {31} A. H. Tewfik, M. Swanson,B. Zhu, and L. Boney, "Robust audio watermarking using perceptual masking," Signal Processing, vol. 66, no. 3, pp. 337-355, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. {32} S. Voloshynovskiy, N. Herrigel, A. Baumgaertner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in Proc. 3rd International Workshop on Information Hiding, vol. 1768 of Lecture Notes in Computer Science, pp. 211-236, Springer, Dresden, Germany, September/October 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. {33} I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. {34} S. Craver, N. Memon, B.-L. Yeo, and M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks and implications," IEEE Journal of Selected Areas in Communications, vol. 16, no. 4, pp. 573-586, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. {35} M. Kutter, S. Voloshynovskiy, and A. Herrigel, "The watermark copy attack," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 371-380, San Jose, Calif, USA, January 2000.Google ScholarGoogle ScholarCross RefCross Ref
  36. {36} M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Processing, vol. 9, no. 3, pp. 432-441, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. {37} I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure, robust watermark for multimedia," in Proc. 1st Int. Workshop on Information Hiding, R. Anderson, Ed., vol. 1174 of Lecture Notes in Computer Science, pp. 185-206, Springer, May/June 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. {38} J. R. Smith and B. O. Comiskey, "Modulation and information hiding in images," in Proc. 1st Int. Workshop on Information Hiding, Ross J. Anderson, Ed., vol. 1174 of Lecture Notes in Computer Science, pp. 207-226, Springer, Isaac Newton Institute, University of Cambridge, UK, May/June 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. {39} J. R. Hernandez, F. Perez-Gonzalez, J. M. Rodriguez, and G. Nieto, "Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 510-524, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. {40} J. J. Eggers and B. Girod, "Quantization effects on digital watermarks," Signal Processing, vol. 81, no. 2, pp. 239-263, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. {41} C. Honsinger and M. Rabbani, "Data embedding using phase dispersion," in Proc. Int. Conf. on Information Technology, 2000.Google ScholarGoogle Scholar
  42. {42} J. J. K. ÓRuanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Processing, vol. 66, no. 3, pp. 303-317, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. {43} C.-Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation resilient public watermarking for images," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 90-98, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  44. {44} C.-P. Wu, P.-C. Su, and C.-C. J. Kuo, "Robust and efficient digital audio watermarking using audio content analysis," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 382-392, San Jose, Calif, USA, January 2000.Google ScholarGoogle ScholarCross RefCross Ref
  45. {45} J. Dittmann, T. Fiebig, and R. Steinmetz, "New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP)," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multi-media Contents II, vol. 3971, pp. 176-185, San Jose, Calif, USA, January 2000.Google ScholarGoogle ScholarCross RefCross Ref
  46. {46} P. Bas, J.-M. Chassery, and B. Macq, "Robust watermarking based on the warping of predefined triangular patterns," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 99-110, San Jose, Calif, USA, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  47. {47} M. Alghoniemy and A. H. Tewfik, "Geometric distortion correction through image normalization," in Proc. International Conference on Multimedia and Expo, ICME '00, New York, NY, USA, August 2000.Google ScholarGoogle Scholar
  48. {48} B. Chen, Design and analysis of digital watermarking, information embedding, and data hiding systems, Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, June 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. {49} I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann, San Francisco, Calif, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. {50} I. J. Cox and M. L. Miller, "Electronic watermarking: the first 50 years," in 4th Workshop on Multimedia Signal Processing, J.-L. Dugelay and K. Rose, Eds., pp. 225-230, Cannes, France, October 2001.Google ScholarGoogle Scholar

Index Terms

  1. The first 50 years of electronic watermarking

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader