Loading…

Digital watermarking of color images using amplitude modulation

Digital watermarking techniques sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the watermark is a number which identifies the owner of the image. The locations in the image where the watermark is embedded are determ...

Full description

Saved in:
Bibliographic Details
Published in:Journal of electronic imaging 1998-04, Vol.7 (2), p.326-332
Main Authors: Kutter, Martin, Jordan, Fre´de´ric, Bossen, Frank
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c334t-6a967f5c653f8ff5666734255b86cbb8f01a6f874f72199bdf57067adf8b368f3
cites
container_end_page 332
container_issue 2
container_start_page 326
container_title Journal of electronic imaging
container_volume 7
creator Kutter, Martin
Jordan, Fre´de´ric
Bossen, Frank
description Digital watermarking techniques sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the watermark is a number which identifies the owner of the image. The locations in the image where the watermark is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the digital watermark. Furthermore, it should be possible to recover the embedded watermark from an altered image. Possible alterations of signed images include blurring, compression, and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single watermark bits are multiply embedded by modifying pixel values in the blue channel. These modifications are proportional to the luminance and either additive or subtractive, depending on the value of the bit. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the watermark can be recovered without the original image. ©
doi_str_mv 10.1117/1.482648
format article
fullrecord <record><control><sourceid>crossref_spie_</sourceid><recordid>TN_cdi_crossref_primary_10_1117_1_482648</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1117_1_482648</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-6a967f5c653f8ff5666734255b86cbb8f01a6f874f72199bdf57067adf8b368f3</originalsourceid><addsrcrecordid>eNo9j09LAzEQxYMoWKvgR9ijl62ZZDNJTiK11UrFi4K3JftnSnS3W5JdxG_vthUHZuYx_HjMY-wa-AwA9C3MMiMwMydsAgp5KoT9OB01B51ay-05u4jxk3MAk8GE3T34je9dk3y7vg6tC19-u0k6Ssqu6ULiW7epYzLE_dW1u8b3Q1UnbVcNjet9t71kZ-SaWF_97Sl7Xy7e5k_p-vVxNb9fp6WUWZ-is6hJlagkGSKFiFpmQqnCYFkUhjg4JKMz0gKsLSpSmqN2FZlCoiE5ZTdH3zJ0MYaa8l0Ynws_OfB8HzyH_Bh8RMURjTtf_2PPi9XLQvF96cMUY0uBBw3yF6RMWGY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Digital watermarking of color images using amplitude modulation</title><source>SPIE Digital Library</source><creator>Kutter, Martin ; Jordan, Fre´de´ric ; Bossen, Frank</creator><creatorcontrib>Kutter, Martin ; Jordan, Fre´de´ric ; Bossen, Frank</creatorcontrib><description>Digital watermarking techniques sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the watermark is a number which identifies the owner of the image. The locations in the image where the watermark is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the digital watermark. Furthermore, it should be possible to recover the embedded watermark from an altered image. Possible alterations of signed images include blurring, compression, and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single watermark bits are multiply embedded by modifying pixel values in the blue channel. These modifications are proportional to the luminance and either additive or subtractive, depending on the value of the bit. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the watermark can be recovered without the original image. ©</description><identifier>ISSN: 1017-9909</identifier><identifier>EISSN: 1560-229X</identifier><identifier>DOI: 10.1117/1.482648</identifier><identifier>CODEN: JEIME5</identifier><language>eng</language><subject>Additive ; Altered image ; Amplitude modulation ; Attacks ; Color images ; Digital watermarking ; Fast Fourier transform (FFT) ; Filtering ; Human visual system (HVS) ; Luminance ; Pixel values ; Subtractive ; Walsh transform ; Wavelet transform</subject><ispartof>Journal of electronic imaging, 1998-04, Vol.7 (2), p.326-332</ispartof><rights>1998 SPIE and IS&amp;T</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c334t-6a967f5c653f8ff5666734255b86cbb8f01a6f874f72199bdf57067adf8b368f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.spiedigitallibrary.org/journalArticle/Download?urlId=10.1117/1.482648$$EPDF$$P50$$Gspie$$H</linktopdf><linktohtml>$$Uhttp://dx.doi.org/10.1117/1.482648$$EHTML$$P50$$Gspie$$H</linktohtml><link.rule.ids>314,780,784,18965,27924,27925,55386,55387</link.rule.ids></links><search><creatorcontrib>Kutter, Martin</creatorcontrib><creatorcontrib>Jordan, Fre´de´ric</creatorcontrib><creatorcontrib>Bossen, Frank</creatorcontrib><title>Digital watermarking of color images using amplitude modulation</title><title>Journal of electronic imaging</title><description>Digital watermarking techniques sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the watermark is a number which identifies the owner of the image. The locations in the image where the watermark is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the digital watermark. Furthermore, it should be possible to recover the embedded watermark from an altered image. Possible alterations of signed images include blurring, compression, and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single watermark bits are multiply embedded by modifying pixel values in the blue channel. These modifications are proportional to the luminance and either additive or subtractive, depending on the value of the bit. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the watermark can be recovered without the original image. ©</description><subject>Additive</subject><subject>Altered image</subject><subject>Amplitude modulation</subject><subject>Attacks</subject><subject>Color images</subject><subject>Digital watermarking</subject><subject>Fast Fourier transform (FFT)</subject><subject>Filtering</subject><subject>Human visual system (HVS)</subject><subject>Luminance</subject><subject>Pixel values</subject><subject>Subtractive</subject><subject>Walsh transform</subject><subject>Wavelet transform</subject><issn>1017-9909</issn><issn>1560-229X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1998</creationdate><recordtype>article</recordtype><recordid>eNo9j09LAzEQxYMoWKvgR9ijl62ZZDNJTiK11UrFi4K3JftnSnS3W5JdxG_vthUHZuYx_HjMY-wa-AwA9C3MMiMwMydsAgp5KoT9OB01B51ay-05u4jxk3MAk8GE3T34je9dk3y7vg6tC19-u0k6Ssqu6ULiW7epYzLE_dW1u8b3Q1UnbVcNjet9t71kZ-SaWF_97Sl7Xy7e5k_p-vVxNb9fp6WUWZ-is6hJlagkGSKFiFpmQqnCYFkUhjg4JKMz0gKsLSpSmqN2FZlCoiE5ZTdH3zJ0MYaa8l0Ynws_OfB8HzyH_Bh8RMURjTtf_2PPi9XLQvF96cMUY0uBBw3yF6RMWGY</recordid><startdate>19980401</startdate><enddate>19980401</enddate><creator>Kutter, Martin</creator><creator>Jordan, Fre´de´ric</creator><creator>Bossen, Frank</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>19980401</creationdate><title>Digital watermarking of color images using amplitude modulation</title><author>Kutter, Martin ; Jordan, Fre´de´ric ; Bossen, Frank</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-6a967f5c653f8ff5666734255b86cbb8f01a6f874f72199bdf57067adf8b368f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1998</creationdate><topic>Additive</topic><topic>Altered image</topic><topic>Amplitude modulation</topic><topic>Attacks</topic><topic>Color images</topic><topic>Digital watermarking</topic><topic>Fast Fourier transform (FFT)</topic><topic>Filtering</topic><topic>Human visual system (HVS)</topic><topic>Luminance</topic><topic>Pixel values</topic><topic>Subtractive</topic><topic>Walsh transform</topic><topic>Wavelet transform</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kutter, Martin</creatorcontrib><creatorcontrib>Jordan, Fre´de´ric</creatorcontrib><creatorcontrib>Bossen, Frank</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of electronic imaging</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kutter, Martin</au><au>Jordan, Fre´de´ric</au><au>Bossen, Frank</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Digital watermarking of color images using amplitude modulation</atitle><jtitle>Journal of electronic imaging</jtitle><date>1998-04-01</date><risdate>1998</risdate><volume>7</volume><issue>2</issue><spage>326</spage><epage>332</epage><pages>326-332</pages><issn>1017-9909</issn><eissn>1560-229X</eissn><coden>JEIME5</coden><abstract>Digital watermarking techniques sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the watermark is a number which identifies the owner of the image. The locations in the image where the watermark is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the digital watermark. Furthermore, it should be possible to recover the embedded watermark from an altered image. Possible alterations of signed images include blurring, compression, and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single watermark bits are multiply embedded by modifying pixel values in the blue channel. These modifications are proportional to the luminance and either additive or subtractive, depending on the value of the bit. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the watermark can be recovered without the original image. ©</abstract><doi>10.1117/1.482648</doi><tpages>7</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1017-9909
ispartof Journal of electronic imaging, 1998-04, Vol.7 (2), p.326-332
issn 1017-9909
1560-229X
language eng
recordid cdi_crossref_primary_10_1117_1_482648
source SPIE Digital Library
subjects Additive
Altered image
Amplitude modulation
Attacks
Color images
Digital watermarking
Fast Fourier transform (FFT)
Filtering
Human visual system (HVS)
Luminance
Pixel values
Subtractive
Walsh transform
Wavelet transform
title Digital watermarking of color images using amplitude modulation
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T13%3A15%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_spie_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Digital%20watermarking%20of%20color%20images%20using%20amplitude%20modulation&rft.jtitle=Journal%20of%20electronic%20imaging&rft.au=Kutter,%20Martin&rft.date=1998-04-01&rft.volume=7&rft.issue=2&rft.spage=326&rft.epage=332&rft.pages=326-332&rft.issn=1017-9909&rft.eissn=1560-229X&rft.coden=JEIME5&rft_id=info:doi/10.1117/1.482648&rft_dat=%3Ccrossref_spie_%3E10_1117_1_482648%3C/crossref_spie_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c334t-6a967f5c653f8ff5666734255b86cbb8f01a6f874f72199bdf57067adf8b368f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true