Abstract
Electronic watermarking can be traced back as far as 1954. The last 10 years has seen considerable interest in digital watermarking, due, in large part, to concerns about illegal piracy of copyrighted content. In this paper, we consider the following questions: is the interest warranted? What are the commercial applications of the technology? What scientific progress has been made in the last 10 years? What are the most exciting areas for research? And where might the next 10 years take us? In our opinion, the interest in watermarking is appropriate. However, we expect that copyright applications will be overshadowed by applications such as broadcast monitoring, authentication, and tracking content distributed within corporations. We further see a variety of applications emerging that add value to media, such as annotation and linking content to the Web. These latter applications may turn out to be the most compelling. Considerable progress has been made toward enabling these applications-perceptual modelling, security threats and countermeasures, and the development of a bag of tricks for efficient implementations. Further progress is needed in methods for handling geometric and temporal distortions. We expect other exciting developments to arise from research in informed watermarking.
- {1} E. F. Hembrooke, "Identification of sound and like signals," United States Patent, 3,004,104, 1961.Google Scholar
- {2} W. M. Tomberlin, L. G. MacKenzie, and P. K. Bennett, "System for transmitting and receiving coded entertainment programs," United States Patent, 2,630,525, 1953.Google Scholar
- {3} C. Walker, "Personal communications," June 2001, Muzak Corporation.Google Scholar
- {4} W. E. Noller, "Inband signalling system,"United States Patent, 3,061,783, 1962.Google Scholar
- {5} R. H. Baer, "Digital video modulation and demodulation system," United States Patent, 3,993,861, 1976.Google Scholar
- {6} R. Dolby, "Apparatus and method for the identification of specially encoded FM stereophonic broadcasts," United States Patent, 4,281,217, 1981.Google Scholar
- {7} R. S. Broughton and W. C. Laumeister, "Interactive video method and apparatus," United States Patent, 4,807,031, 1989.Google Scholar
- {8} D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," in Advances in Cryptology-Crypto '95, vol. 963 of Lecture Notes in Computer Science, pp. 452-465, Springer-Verlag, Berlin, 1995. Google ScholarDigital Library
- {9} H. S. Stone, "Analysis of attacks on image watermarks with randomized coefficients," Technical report TR 96-045, NEC Research Institute, Princeton, NJ, USA, May 1996.Google Scholar
- {10} J. Kilian, T. Leighton, L. R. Matheson, T. Shamoon, and R. E. Tarjan, "Resistance of watermarked documents to collusional attacks," Technical report TR 97-167, NEC Research Institute, Princeton, NJ, USA, 1997.Google Scholar
- {11} S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, "Can invisible watermarks resolve rightful ownerships?," IBM Technical Report RC 20509, IBM Research, July 1996, in IBM Cyber Journal, http://www.research.ibm.com.Google Scholar
- {12} J. P. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. 2nd Int. Workshop on Information Hiding, pp. 258-272, Portland, Ore, USA, April 1998.Google ScholarCross Ref
- {13} I. J. Cox and J.-P. M. G. Linnartz, "Some general methods for tampering with watermarks," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 587-593, 1998. Google ScholarDigital Library
- {14} M. Goljan, J. Fridrich, and R. Du, "Distortion-free data embedding for images," in Proc. 4th Int. Workshop on Information Hiding, pp. 27-41, Pittsburgh, Pa, USA, 2001. Google ScholarDigital Library
- {15} W. F. Schreiber, E. H. Adelson, A. B. Lippman, et al., "A compatible high-definition television system using the noise-margin method of hiding enhancement information," SMPTE Journal, vol. 98, no. 12, pp. 873-879, 1989.Google ScholarCross Ref
- {16} H. C. Papadopoulos and C.-E. W. Sundberg, "Simultaneous broadcasting of analog FM and digital audio signals by means of adaptive precanceling techniques," IEEE Trans. Communications , vol. 46, no. 9, pp. 1233-1242, 1998.Google ScholarCross Ref
- {17} B. Chen and C.-E. W. Sundberg, "Digital audio broadcasting in the FM band by means of contiguous band insertion and precancelling techniques," IEEE Trans. Communications, vol. 48, no. 10, pp. 1634-1637, 2000.Google ScholarCross Ref
- {18} M. van der Veen, W. Oomen, F. Bruekers, J. Haitsma, T. Kalker, and A. N. Lemma, "Robust, multi-functional, and high quality audio watermarking technology," in 110th Audio Engineering Society Convention, vol. 5345, Amsterdam, The Netherlands, May 2001.Google Scholar
- {19} D. Kirovski and H. S. Malvar, "Robust covert communication over a public audio channel using spread spectrum," in Information Hiding Workshop, I. S. Moskowitz and J. McHugh, Eds., pp. 354-368, Pittsburgh, Pa, USA, April 2001. Google ScholarDigital Library
- {20} I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proceedings of the IEEE, vol. 87, no. 7, pp. 1127-1141, 1999.Google ScholarCross Ref
- {21} J. Chou, S. S. Pradhan, and K. Ramchandran, "On the duality between data hiding and distributed source coding," in Proc. Annual Asilomar Conf. Signals, Systems, and Computers, vol. 2, pp. 1503-1507, Pacific Grove, Calif, USA, November 1999.Google Scholar
- {22} B. Chen and G. W. Wornell, "An information-theoretic approach to the design of robust digital watermarking systems," in Proc. Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), vol. 4, pp. 2061-2064, Phoenix, Ariz, USA, March 1999. Google ScholarDigital Library
- {23} C. E. Shannon, "Channels with side information at the transmitter," IBM J. Res. Develop., vol. 6, no. 2, pp. 3630-3633, 1958.Google Scholar
- {24} M. L. Miller, I. J. Cox, and J. A. Bloom, "Informed embedding: exploiting image and detector information during watermark insertion," in Proc. IEEE International Conference on Image Processing, vol. 3, pp. 1-4, September 2000.Google ScholarCross Ref
- {25} J. Chou, S. Pradhan, L. El Ghaoui, and K. Ramchandran, "Watermarking based on duality with distributed source coding and robust optimization principles," in Proc. IEEE International Conference on Image Processing, vol. 1, pp. 585-588, Vancouver, Canada, September 2000.Google Scholar
- {26} B. Chen and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," in Proc. IEEE International Symposium on Information Theory (ISIT-2000), p. 46, Sorrento, Italy, June 2000.Google ScholarCross Ref
- {27} P. Moulin and J. O'Sullivan, "Information-theoretic analysis of information hiding," in Proc. ICASSP '00, Istanbul, Turkey, 2000.Google Scholar
- {28} M. H. M. Costa, "Writing on dirty paper," IEEE Transactions on Information Theory, vol. 29, no. 3, pp. 439-441, 1983.Google ScholarDigital Library
- {29} I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," Technical report 9510, NEC Research Institute, Princeton, NJ, USA, 1995.Google Scholar
- {30} C. Podilchuk and W. Zeng, "Image-adaptive watermarking using visual models," IEEE Journal on Selected Areas in Communications , vol. 16, no. 4, pp. 525-539, 1998. Google ScholarDigital Library
- {31} A. H. Tewfik, M. Swanson,B. Zhu, and L. Boney, "Robust audio watermarking using perceptual masking," Signal Processing, vol. 66, no. 3, pp. 337-355, 1998. Google ScholarDigital Library
- {32} S. Voloshynovskiy, N. Herrigel, A. Baumgaertner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in Proc. 3rd International Workshop on Information Hiding, vol. 1768 of Lecture Notes in Computer Science, pp. 211-236, Springer, Dresden, Germany, September/October 1999. Google ScholarDigital Library
- {33} I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997. Google ScholarDigital Library
- {34} S. Craver, N. Memon, B.-L. Yeo, and M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks and implications," IEEE Journal of Selected Areas in Communications, vol. 16, no. 4, pp. 573-586, 1998. Google ScholarDigital Library
- {35} M. Kutter, S. Voloshynovskiy, and A. Herrigel, "The watermark copy attack," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 371-380, San Jose, Calif, USA, January 2000.Google ScholarCross Ref
- {36} M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Processing, vol. 9, no. 3, pp. 432-441, 2000. Google ScholarDigital Library
- {37} I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure, robust watermark for multimedia," in Proc. 1st Int. Workshop on Information Hiding, R. Anderson, Ed., vol. 1174 of Lecture Notes in Computer Science, pp. 185-206, Springer, May/June 1996. Google ScholarDigital Library
- {38} J. R. Smith and B. O. Comiskey, "Modulation and information hiding in images," in Proc. 1st Int. Workshop on Information Hiding, Ross J. Anderson, Ed., vol. 1174 of Lecture Notes in Computer Science, pp. 207-226, Springer, Isaac Newton Institute, University of Cambridge, UK, May/June 1996. Google ScholarDigital Library
- {39} J. R. Hernandez, F. Perez-Gonzalez, J. M. Rodriguez, and G. Nieto, "Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 510-524, 1998. Google ScholarDigital Library
- {40} J. J. Eggers and B. Girod, "Quantization effects on digital watermarks," Signal Processing, vol. 81, no. 2, pp. 239-263, 2001. Google ScholarDigital Library
- {41} C. Honsinger and M. Rabbani, "Data embedding using phase dispersion," in Proc. Int. Conf. on Information Technology, 2000.Google Scholar
- {42} J. J. K. ÓRuanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Processing, vol. 66, no. 3, pp. 303-317, 1998. Google ScholarDigital Library
- {43} C.-Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation resilient public watermarking for images," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 90-98, 2000.Google ScholarCross Ref
- {44} C.-P. Wu, P.-C. Su, and C.-C. J. Kuo, "Robust and efficient digital audio watermarking using audio content analysis," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 382-392, San Jose, Calif, USA, January 2000.Google ScholarCross Ref
- {45} J. Dittmann, T. Fiebig, and R. Steinmetz, "New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP)," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multi-media Contents II, vol. 3971, pp. 176-185, San Jose, Calif, USA, January 2000.Google ScholarCross Ref
- {46} P. Bas, J.-M. Chassery, and B. Macq, "Robust watermarking based on the warping of predefined triangular patterns," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 99-110, San Jose, Calif, USA, 2000.Google ScholarCross Ref
- {47} M. Alghoniemy and A. H. Tewfik, "Geometric distortion correction through image normalization," in Proc. International Conference on Multimedia and Expo, ICME '00, New York, NY, USA, August 2000.Google Scholar
- {48} B. Chen, Design and analysis of digital watermarking, information embedding, and data hiding systems, Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, June 2000. Google ScholarDigital Library
- {49} I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann, San Francisco, Calif, USA, 2001. Google ScholarDigital Library
- {50} I. J. Cox and M. L. Miller, "Electronic watermarking: the first 50 years," in 4th Workshop on Multimedia Signal Processing, J.-L. Dugelay and K. Rose, Eds., pp. 225-230, Cannes, France, October 2001.Google Scholar
Index Terms
- The first 50 years of electronic watermarking
Recommendations
The first 50 years of electronic watermarking
Emerging applications of multimedia data hidingElectronic watermarking can be traced back as far as 1954. The last 10 years has seen considerable interest in digital watermarking, due, in large part, to concerns about illegal piracy of copyrighted content. In this paper, we consider the following ...
Watermarking, steganography and content forensics
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityElectronic watermarking is about 60 years old. However it was not until the beginning of the early 1990's that watermarking received widespread interest, due to concerns about piracy of digital content. In the subsequent decade, very significant ...
A steganographic method based upon JPEG and quantization table modification
Special issue: Intelligent multimedia computing and networkingIn this paper, a novel steganographic method based on joint photographic expert-group (JPEG) is proposed. The proposed method modifies the quantization table first. Next, the secret message is hidden in the cover-image with its middle-frequency of the ...
Comments