Skip to main content

Region-Based Watermarking for Images

  • Conference paper
  • First Online:
Information Security (ISW 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1729))

Included in the following conference series:

Abstract

There is a spate of research activities investigating digital image watermarking schemes in an effort to control the problem of illegal proliferation of creative digital data across the Internet. Several schemes, with their merits and demerits, have been proposed to date. However, many of them rely on the presentation of a test image in an appropriate format before the detection can proceed. In most cases this is achieved through some form of preprocessing. This paper proposes a technique, using image region segmentation, which alleviates many of the problems associated with pre-processing and thus allowing the detection process to be more independent as well as reducing the need for human intervention.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Z. Tirkel, C. F. Osborne, and T. E. Hall, “Image and watermark registration”, Signal Processing, vol 66, pp373–383, 1998.

    Article  Google Scholar 

  2. M. Schneider and Shih-Fu Chang, “A Robust Content Based Digital Signature for Image Authentication”, Proceedings of the 1996 International Conference in Image Processing, pp 227–230, 1997.

    Google Scholar 

  3. J. O. Ruanaidh, W. Dowling, and F. Boland, “Phase Watermarking of Digital Images”, Proceedings of the 1996 International Conference on Image Processing, vol. 3, pp 239–242, 1996.

    Google Scholar 

  4. D. Fleet, and D. Heeger, “Embedding Invisible Information in Color Images”, Proceedings of the 1997 International Conference on Image Processing, pp 532–534, 1997.

    Google Scholar 

  5. I. Cox, J. Kilian, T. Leighton, and T. Shamoon “A Secure, Robust Watermark for Multimedia”, NEC Research Institute, Technical Report 95-10, 1995.

    Google Scholar 

  6. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, pp313–336, 1996.

    Article  Google Scholar 

  7. A. Gersho and R. M. Gray, Vector Quantization and Signal Compression, Kluwer Academic Publishers Group, 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Brisbane, G., Safavi-Naini, R., Ogunbona, P. (1999). Region-Based Watermarking for Images. In: Information Security. ISW 1999. Lecture Notes in Computer Science, vol 1729. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47790-X_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-47790-X_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66695-0

  • Online ISBN: 978-3-540-47790-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics