Proceedings chapter
OA Policy
English

Watermarking methods

Presented atLos Angeles (USA), Aug 8-13
Publication date1999
Abstract

Watermarks. The term evokes visions of shady characters secretly beavering away in dark basements surrounded by forged $100 bills drying on clothes lines. In a digital media context, away from the traditional world of inks and paper, the same old problem remains but it relates not just to forgery but also to outright theft, because one digital copy can spawn millions of others with the single click of a mouse button. It is hardly surprising that the notion of a digital watermark has stimulated avid interest amongst artists and publishers alike. It is commonly recognized that digital watermarks must be as robust as the media in which they are embedded. For example, a rotated, cropped, and rescanned water-marked image should still be a watermarked image. However, this robustness requirement directly conflicts with the need for a digital watermark to be unobtrusive. The most effective techniques used to embed watermarks are the result of a combination of secret key-based techniques used for military communication and simple models of the human visual system. The most familiar application for digital watermarks is for copyright protection and protection of intellectual property. On its own, a watermark does not provide any legal proof of ownership. In other words, the use of a given digital watermark to protect intellectual property must be registered with a trusted third party to be of any value. Any technique for embedding robust digital watermarks must be compatible with methods for registering copyright. A watermark's resistance to intentional and unintentional degradation has been the main subject of interest in the watermarking community. The main challenges are geometric transformations such as change of proportion or simple rescaling. One watermark removal technique that is supplied on the Internet simply shifts a corner of the image. Lossy image compression such as JPEG and filtering are more easily overcome and, generally speaking, watermarks have evolved into very resistant forms. The laboratory, but will they really work in the real world?

Keywords
  • Watermarking
Citation (ISO format)
O’RUANAIDH, Joséph John, CSURKA, Gabriela Otilia. Watermarking methods. In: 26th International Conference on Computer Graphics and Interactive Techniques (SIGGRAPH′99). Los Angeles (USA). [s.l.] : [s.n.], 1999.
Main files (1)
Proceedings chapter (Published version)
accessLevelPublic
Identifiers
  • PID : unige:47702
517views
116downloads

Technical informations

Creation06/03/2015 18:12:08
First validation06/03/2015 18:12:08
Update time14/03/2023 23:58:44
Status update14/03/2023 23:58:44
Last indexation31/10/2024 00:18:01
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack