Share Email Print

Proceedings Paper

Results of attacks on a claimed robust digital image watermark
Author(s): Gordon W. Braudaway
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

Placing either a visible or invisible mark on a document to help establish its ownership is not a new or revolutionary concept. For hundreds of years, owners of important documents or works of art have imprinted identifying marks onto them, not only to help establish their ownership, but also to discourage those who might wish to misappropriate the work. Today, invisible watermarking of digital images is attempted for those same purposes. To be useful, an ownership watermark must robustly survive and be detectable after any manipulation that does not damage a digital image beyond usability. In the extreme, the watermark must survive the printing and rescanning of the image. Additionally, the probability of detecting a watermark in an image that does not have one must be vanishingly small. An embodiment of invisible watermarking claiming to have these properties has been presented previously by the author. This paper reports the results of typical image manipulations and deliberate attacks on robust invisible watermarks of the type reported. Image manipulations include lossy JPEG compression, small angle rotation, linear and nonlinear resizing, cropping, and sharpening. Attacks include the superposition of uncorrelated noise fields, overmarking, and RSS alterations.

Paper Details

Date Published: 1 April 1998
PDF: 10 pages
Proc. SPIE 3314, Optical Security and Counterfeit Deterrence Techniques II, (1 April 1998); doi: 10.1117/12.304678
Show Author Affiliations
Gordon W. Braudaway, IBM Thomas J. Watson Research Ctr. (United States)

Published in SPIE Proceedings Vol. 3314:
Optical Security and Counterfeit Deterrence Techniques II
Rudolf L. van Renesse, Editor(s)

© SPIE. Terms of Use
Back to Top