CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Digital Watermarking: Applications, Techniques and Attacks

by Smitha Rao M.s, Jyothsna A.n, Pinaka Pani.r
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 7
Year of Publication: 2012
Authors: Smitha Rao M.s, Jyothsna A.n, Pinaka Pani.r
10.5120/6277-8442

Smitha Rao M.s, Jyothsna A.n, Pinaka Pani.r . Digital Watermarking: Applications, Techniques and Attacks. International Journal of Computer Applications. 44, 7 ( April 2012), 29-34. DOI=10.5120/6277-8442

@article{ 10.5120/6277-8442,
author = { Smitha Rao M.s, Jyothsna A.n, Pinaka Pani.r },
title = { Digital Watermarking: Applications, Techniques and Attacks },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 7 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number7/6277-8442/ },
doi = { 10.5120/6277-8442 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:34:56.726675+05:30
%A Smitha Rao M.s
%A Jyothsna A.n
%A Pinaka Pani.r
%T Digital Watermarking: Applications, Techniques and Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 7
%P 29-34
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As information transmission technology progresses, the technology to protect data from unauthorized users also needs to be enhanced. Data can be plagiarized, modified, deleted etc without proper authentication and authorization. Various security mechanisms have evolved that enhances the security of digital media. Each technology to be applied successfully should ensure a balance between the three pillars of security; confidentiality, integrity and availability. Digital watermarking is one such technique. It is a mechanism to monitor the digital media with the help of information residing within the content itself. To put it simply, digital watermarking is embedding of information into source content that can be detected and extracted. Digital watermarking can be applied to media like text, audio, image, video etc. This paper provides a comprehensive idea behind this technology and its usage.

References
  1. Joo Lee and Sung-Hwan Jung: "A survey of watermarking techniques applied to multimedia," Proceedings 2001 IEEE International Symposium on Industrial Electronics (ISIE2001), Volume. 1, pp: 272 -277,
  2. .
  3. Jiang Xuehua;, "Digital Watermarking and its Application in Image Copyright Protection," Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on , vol. 2, no. , pp. 114-117, 11-12 [May 2010].
  4. D. Gruhl, A. Lu, and W. Bender. "Echo hiding". In Proceedings of the First Internationational Workshop on information hiding LNCS 1174, pages 295-315, 1996
  5. Christoph Busch, Wolfgang Funk, and Stephen Wolthusen, "Digital watermarking: From concepts to real-time video applications", IEEE Computer Graphics and Applications 19 (1999), no. 1, pp 25–35.
  6. Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal hamoon, "Secure spread spectrum watermarking for multimedia", Technical Report 95-10, NEC Research Institute, 1995.
  7. F. Hartung and M. Kutter, "Multimedia watermarking techniques," In Proceedings of the IEEE, Vol. 87, No. 7, pp. 1079-1107, July 1999.
  8. Ding Huang; Hong Yan; , "Interword distance changes represented by sine waves for watermarking text images," Circuits and Systems for Video Technology, IEEE Transactions on , vol. 11, no. 12, pp. 1237-1245, Dec 2001
  9. Young-Won Kim; Kyung-Ae Moon; Il-Seok Oh; , "A text watermarking algorithm based on word classification and inter-word space statistics," Document Analysis and Recognition, 2003. Proceedings. Seventh International Conference on, vol. , no. , pp. 775- 779, 3-6 Aug. 2003.
  10. J. T. Brassil, S. Low, and N. F. Maxemchuk, "Copyright protection for the electronic distribution of text documents," Proceedings of IEEE, Vol. 87, No. 7, pp. 1181- 1196, July 1999.
  11. Acevedo A. , "Digital Watermarking for Audio Data in Techniques and Applications of Digital Watermarking and Content Protection", Artech House, USA, 2003.
  12. Arnold M. , "Audio Watermarking: Features, Applications and algorithms". In Processings of the IEEE International Conference on Multimedia and Expo, pp. 1013-1016, 2000.
  13. Akira Nishimura, "Presentation of Information Synchronized with the Audio Signal reproduced by Loudspeakers using an AM based Watermark".
  14. Ali Al-Haj (2010), "Digital Watermarking based on the Diescrete Wavelets Transforms and Singular Value Decomposition" proceedings of the European journal of Scientific Research ISSN 1450-216 abd Vol. 39 No. 1 pp 6-21.
  15. Kotaro Yamamoto and Munetoshi Iwasiri, (2010), "Real-Time Audio Watermarking Based on Charecteristics of PCM in Digital Instrument", Journal of Information Hiding and Multimedia Signal Processing, (2010), ISSN 2073-4212 and Vol. 1, No. 2 April 2010.
  16. Zhao Xu, Ke Wang and Xiao-hua Qiao, "Digital Audio Watermarking algorithm Based on Quantizing Coefficients" , proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP'06.
  17. Nedeljko Cvejic, Tapio Seppanen, " Improving Audio Watermarking Scheme Using Psychoacoustic Watermark Filtering".
  18. W. N. Lie and L. C. Chang, "Robust and High-Quality Time-Domain Audio Watermarking Subject to Psychoacoustic Masking ", proceedings of IEEE International symposium on circuits and system, 2001, 2 , pp. 45-48.
  19. Hyoung Joong Kim, "Audio Watermarking Techniques".
  20. Say Wei Foo; "Non-blind audio-watermarking using compression-expansion of signals," Circuits and Systems, 2008. APCCAS 2008. IEEE Asia Pacific Conference on, vol. , no. , pp. 1288-1291, Nov. 30 2008-Dec. 3 2008.
  21. M. A. Dorairangaswamy, B. Padmavathi, "An Effective Blind Watermarking Scheme for Protecting Rightful Ownership of Digital Images", IEEE international conference TENCON 2009.
  22. S. P. Mohanty, et al. , "A Dual Watermarking Technique for Images", Proc. 7th ACM International Multimedia Conference, ACM-MM'99, Part 2, pp. 49-51, Orlando, USA, Oct. 1999.
  23. Bender W. , Gruhl D. , Morimoto N. and Lu A. 1996, "Techniques for Data Hiding", IBM Systems Journal, Vol. 35, No. 3 & 4, pp. 313-335.
  24. I. J. Cox et. al. , "Secure Spread Spectrum Watermarking of Images, Audio and Video", Proc IEEE International Conf on Image Processing, ICIP-96, Vol. 3, pp 243-246.
  25. G. Coatrieux H. Maitre, B. Sankur, Y. Rolland, R. Collorec, "Relevance of Watermarking in Medical Imaging," in Proc. IEEE Int. Conf. ITAB, USA, 2000, pp. 250-255.
  26. F. Mintzer, J. Lotspiech, and N. Morimoto, "Safeguarding digital library contents and users: Digital watermarking," D-Lib Mag. , Dec. 1997.
  27. J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol. , vol. 13, no. 8, pp. 890–896,Aug. 2003.
  28. K. Tanaka, Y. Nakamura, and K. Masui, "Embedding secret information into a dithered multilevel image," In Proceedings of the 1990 IEEE Military Communications Conference, pp. 216-220, September 1990.
  29. C. -M. Pun, " A Novel DFT-based Digital Watermarking System for Images," Proceedings of the 8th International Conference on Signal Processing, Volume II of IV, pp. 1245-1248, IEEE Press, Guilin, China, November 2006.
  30. Lu Ye; "FFT Based Blind Watermarking Algorithm for Three Dimensional Motion Picture", Internet Technology and Applications, 2010 International Conference on , vol. , no. , pp. 1-4, 20-22 Aug. 2010 doi: 10. 1109/ITAPP. 2010. 5566494
  31. Yang, M. Schmucker, W. Funk, C. Busch, and S. Sun, "Integer DCT-based reversible watermarking for images using companding technique," in Proc. SPIE, Security, Steganography, andWatermarking of Multimedia Contents, San Jose, CA, Jan. 2004, pp. 405–415.
  32. Sunil Lee, Chang D. Yoo and Ton Kalker, "Reversible Image Watermarking Based on Integer to Integer wavelet Transform", IEEE Transactions on Information Forensics and Security, Vol. 2 No. 3, September 2007
  33. M. D. Swanson, B. Zhu and A. H. Tewfik,"Multiresolution scene-based video watermarking using perceptual models", IEEE Journal on selected Areas in communications, vol. 16, no. 4, pp. 540-550, May 1998.
  34. I. Cox, J. Linnartz, "Some General Methods for Tampering with Watermarks", IEEE Journal on sel. areas, in Comm. , vol. 16, no. 4, May 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Fingerprinting Phase Encoding Spread Spectrum Watermarking Echo Watermarking Dual Watermark Class A Attacks Class B Attacks