Loading…
Digital watermarking of color images using amplitude modulation
Digital watermarking techniques sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the watermark is a number which identifies the owner of the image. The locations in the image where the watermark is embedded are determ...
Saved in:
Published in: | Journal of electronic imaging 1998-04, Vol.7 (2), p.326-332 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c334t-6a967f5c653f8ff5666734255b86cbb8f01a6f874f72199bdf57067adf8b368f3 |
---|---|
cites | |
container_end_page | 332 |
container_issue | 2 |
container_start_page | 326 |
container_title | Journal of electronic imaging |
container_volume | 7 |
creator | Kutter, Martin Jordan, Fre´de´ric Bossen, Frank |
description | Digital watermarking techniques sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the watermark is a number which identifies the owner of the image. The locations in the image where the watermark is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the digital watermark. Furthermore, it should be possible to recover the embedded watermark from an altered image. Possible alterations of signed images include blurring, compression, and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single watermark bits are multiply embedded by modifying pixel values in the blue channel. These modifications are proportional to the luminance and either additive or subtractive, depending on the value of the bit. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the watermark can be recovered without the original image. © |
doi_str_mv | 10.1117/1.482648 |
format | article |
fullrecord | <record><control><sourceid>crossref_spie_</sourceid><recordid>TN_cdi_crossref_primary_10_1117_1_482648</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1117_1_482648</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-6a967f5c653f8ff5666734255b86cbb8f01a6f874f72199bdf57067adf8b368f3</originalsourceid><addsrcrecordid>eNo9j09LAzEQxYMoWKvgR9ijl62ZZDNJTiK11UrFi4K3JftnSnS3W5JdxG_vthUHZuYx_HjMY-wa-AwA9C3MMiMwMydsAgp5KoT9OB01B51ay-05u4jxk3MAk8GE3T34je9dk3y7vg6tC19-u0k6Ssqu6ULiW7epYzLE_dW1u8b3Q1UnbVcNjet9t71kZ-SaWF_97Sl7Xy7e5k_p-vVxNb9fp6WUWZ-is6hJlagkGSKFiFpmQqnCYFkUhjg4JKMz0gKsLSpSmqN2FZlCoiE5ZTdH3zJ0MYaa8l0Ynws_OfB8HzyH_Bh8RMURjTtf_2PPi9XLQvF96cMUY0uBBw3yF6RMWGY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Digital watermarking of color images using amplitude modulation</title><source>SPIE Digital Library</source><creator>Kutter, Martin ; Jordan, Fre´de´ric ; Bossen, Frank</creator><creatorcontrib>Kutter, Martin ; Jordan, Fre´de´ric ; Bossen, Frank</creatorcontrib><description>Digital watermarking techniques sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the watermark is a number which identifies the owner of the image. The locations in the image where the watermark is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the digital watermark. Furthermore, it should be possible to recover the embedded watermark from an altered image. Possible alterations of signed images include blurring, compression, and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single watermark bits are multiply embedded by modifying pixel values in the blue channel. These modifications are proportional to the luminance and either additive or subtractive, depending on the value of the bit. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the watermark can be recovered without the original image. ©</description><identifier>ISSN: 1017-9909</identifier><identifier>EISSN: 1560-229X</identifier><identifier>DOI: 10.1117/1.482648</identifier><identifier>CODEN: JEIME5</identifier><language>eng</language><subject>Additive ; Altered image ; Amplitude modulation ; Attacks ; Color images ; Digital watermarking ; Fast Fourier transform (FFT) ; Filtering ; Human visual system (HVS) ; Luminance ; Pixel values ; Subtractive ; Walsh transform ; Wavelet transform</subject><ispartof>Journal of electronic imaging, 1998-04, Vol.7 (2), p.326-332</ispartof><rights>1998 SPIE and IS&T</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c334t-6a967f5c653f8ff5666734255b86cbb8f01a6f874f72199bdf57067adf8b368f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.spiedigitallibrary.org/journalArticle/Download?urlId=10.1117/1.482648$$EPDF$$P50$$Gspie$$H</linktopdf><linktohtml>$$Uhttp://dx.doi.org/10.1117/1.482648$$EHTML$$P50$$Gspie$$H</linktohtml><link.rule.ids>314,780,784,18965,27924,27925,55386,55387</link.rule.ids></links><search><creatorcontrib>Kutter, Martin</creatorcontrib><creatorcontrib>Jordan, Fre´de´ric</creatorcontrib><creatorcontrib>Bossen, Frank</creatorcontrib><title>Digital watermarking of color images using amplitude modulation</title><title>Journal of electronic imaging</title><description>Digital watermarking techniques sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the watermark is a number which identifies the owner of the image. The locations in the image where the watermark is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the digital watermark. Furthermore, it should be possible to recover the embedded watermark from an altered image. Possible alterations of signed images include blurring, compression, and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single watermark bits are multiply embedded by modifying pixel values in the blue channel. These modifications are proportional to the luminance and either additive or subtractive, depending on the value of the bit. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the watermark can be recovered without the original image. ©</description><subject>Additive</subject><subject>Altered image</subject><subject>Amplitude modulation</subject><subject>Attacks</subject><subject>Color images</subject><subject>Digital watermarking</subject><subject>Fast Fourier transform (FFT)</subject><subject>Filtering</subject><subject>Human visual system (HVS)</subject><subject>Luminance</subject><subject>Pixel values</subject><subject>Subtractive</subject><subject>Walsh transform</subject><subject>Wavelet transform</subject><issn>1017-9909</issn><issn>1560-229X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1998</creationdate><recordtype>article</recordtype><recordid>eNo9j09LAzEQxYMoWKvgR9ijl62ZZDNJTiK11UrFi4K3JftnSnS3W5JdxG_vthUHZuYx_HjMY-wa-AwA9C3MMiMwMydsAgp5KoT9OB01B51ay-05u4jxk3MAk8GE3T34je9dk3y7vg6tC19-u0k6Ssqu6ULiW7epYzLE_dW1u8b3Q1UnbVcNjet9t71kZ-SaWF_97Sl7Xy7e5k_p-vVxNb9fp6WUWZ-is6hJlagkGSKFiFpmQqnCYFkUhjg4JKMz0gKsLSpSmqN2FZlCoiE5ZTdH3zJ0MYaa8l0Ynws_OfB8HzyH_Bh8RMURjTtf_2PPi9XLQvF96cMUY0uBBw3yF6RMWGY</recordid><startdate>19980401</startdate><enddate>19980401</enddate><creator>Kutter, Martin</creator><creator>Jordan, Fre´de´ric</creator><creator>Bossen, Frank</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>19980401</creationdate><title>Digital watermarking of color images using amplitude modulation</title><author>Kutter, Martin ; Jordan, Fre´de´ric ; Bossen, Frank</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-6a967f5c653f8ff5666734255b86cbb8f01a6f874f72199bdf57067adf8b368f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1998</creationdate><topic>Additive</topic><topic>Altered image</topic><topic>Amplitude modulation</topic><topic>Attacks</topic><topic>Color images</topic><topic>Digital watermarking</topic><topic>Fast Fourier transform (FFT)</topic><topic>Filtering</topic><topic>Human visual system (HVS)</topic><topic>Luminance</topic><topic>Pixel values</topic><topic>Subtractive</topic><topic>Walsh transform</topic><topic>Wavelet transform</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kutter, Martin</creatorcontrib><creatorcontrib>Jordan, Fre´de´ric</creatorcontrib><creatorcontrib>Bossen, Frank</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of electronic imaging</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kutter, Martin</au><au>Jordan, Fre´de´ric</au><au>Bossen, Frank</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Digital watermarking of color images using amplitude modulation</atitle><jtitle>Journal of electronic imaging</jtitle><date>1998-04-01</date><risdate>1998</risdate><volume>7</volume><issue>2</issue><spage>326</spage><epage>332</epage><pages>326-332</pages><issn>1017-9909</issn><eissn>1560-229X</eissn><coden>JEIME5</coden><abstract>Digital watermarking techniques sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the watermark is a number which identifies the owner of the image. The locations in the image where the watermark is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the digital watermark. Furthermore, it should be possible to recover the embedded watermark from an altered image. Possible alterations of signed images include blurring, compression, and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single watermark bits are multiply embedded by modifying pixel values in the blue channel. These modifications are proportional to the luminance and either additive or subtractive, depending on the value of the bit. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the watermark can be recovered without the original image. ©</abstract><doi>10.1117/1.482648</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1017-9909 |
ispartof | Journal of electronic imaging, 1998-04, Vol.7 (2), p.326-332 |
issn | 1017-9909 1560-229X |
language | eng |
recordid | cdi_crossref_primary_10_1117_1_482648 |
source | SPIE Digital Library |
subjects | Additive Altered image Amplitude modulation Attacks Color images Digital watermarking Fast Fourier transform (FFT) Filtering Human visual system (HVS) Luminance Pixel values Subtractive Walsh transform Wavelet transform |
title | Digital watermarking of color images using amplitude modulation |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T13%3A15%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_spie_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Digital%20watermarking%20of%20color%20images%20using%20amplitude%20modulation&rft.jtitle=Journal%20of%20electronic%20imaging&rft.au=Kutter,%20Martin&rft.date=1998-04-01&rft.volume=7&rft.issue=2&rft.spage=326&rft.epage=332&rft.pages=326-332&rft.issn=1017-9909&rft.eissn=1560-229X&rft.coden=JEIME5&rft_id=info:doi/10.1117/1.482648&rft_dat=%3Ccrossref_spie_%3E10_1117_1_482648%3C/crossref_spie_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c334t-6a967f5c653f8ff5666734255b86cbb8f01a6f874f72199bdf57067adf8b368f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |