Skip to main content

Neural Networks Functions for Public Key Watermarking

  • Conference paper
  • First Online:
Information Hiding (IH 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2137))

Included in the following conference series:

Abstract

In this paper, we propose to use multi-layers neural networks (MLNN) architectures to build public detection functions that approach the detection performance of secret key watermarking. The attractive properties of MLNN for public key watermarking are revealed by a theoretical analysis of linear MLNN. With some approximations, the detection performance of non-linear MLNN, which offer more resistance to attacks, can also be predicted. Experiments on simulated data confirm the theoretical analysis. Also, experiments on real data demonstrate that the selected detection functions are resistant to JPEG compression. Overall, this paper should bring optimism regarding the practical existence of public key watermarking schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B. Chen and G. W. Wornell. Dither modulation: A new approach to digital watermarking and information embedding. In Proc. of SPIE: Security and Watermarking of Multimedia Contents, volume 3657, pages 342–353, 1999.

    Google Scholar 

  2. I. J. Cox and J. P. M. G. Linnartz. Public watermarks and resistance to tampering. In International Conference on Image Processing, 1997.

    Google Scholar 

  3. J. J. Eggers, J. K. Su, and B. Girod. Asymmetric watermarking schemes. In Tagung-band des GlWorkshops, 2000.

    Google Scholar 

  4. J. J. Eggers, J. K. Su, and B. Girod. Public key watermarking by eigenvectors of linear transforms. In EUSIPCO, 2000.

    Google Scholar 

  5. T. Furon and P. Duhamel. An asymmetric public detection scheme. In Information Hiding Workshop, pages 88–100, 1999.

    Google Scholar 

  6. T. Furon and P. Duhamel. Robustness of asymmetric watermarking technique. In IEEE International Conference on Image Processing, volume 3, pages 21–24, 2000

    Google Scholar 

  7. J. R. Hernandez, M. Amado, and F. Perez-Gonzalez. Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on Image Processing, 9(l):55–68, 2000.

    Article  Google Scholar 

  8. T. Kalker, J. P. M. G. Linnartz, and M. van Dijk. Watermark estimation through detector analysis. In International Conference on Image Processing, 1998.

    Google Scholar 

  9. J. P. M. G. Linnartz and M. van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In Workshop on Information Hiding, 1998.

    Google Scholar 

  10. J. Picard and A. Robert. On the public key watermarking issue. In Proc. of SPIE: Security and Watermarking of Multimedia Contents, volume 3971, 2001

    Google Scholar 

  11. A. Robert and J. Picard. Masking models and watermark unDetection. In Proc. of SPIE: Security and Watermarking of Multimedia Contents, volume 3971, 2001.

    Google Scholar 

  12. J. R. Smith and C. Dodge. Developments in steganography. In Information Hiding Workshop, pages 77–87, 1999.

    Google Scholar 

  13. R. G. van Schyndel, A. Z. Tirkel, and I. D. Svalbe. Key independent watermark detection. In Proceedings of the IEEE Intl. Conference on Multimedia Computing and Systems, volume 1, Florence, Italy, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Picard, J., Robert, A. (2001). Neural Networks Functions for Public Key Watermarking. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-45496-9_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42733-9

  • Online ISBN: 978-3-540-45496-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics