Lecture 9
Lecture 9 Digital Watermarking
.
Outline
.
General Watermarking Procedures
.
Ownership Assertion
.
Fingerprinting
.
Other Applications
.
Other Applications
.
Other Applications
.
Taxonomy
.
Robustness Against These Modifications
.
Spatial Technique #1: m-sequences [van Schyndel , Tirkel , and Osborne \'9194 ]
.
Pros and Cons
.
Spatial Technique #2 [ Nikolaidis and Pitas \'9196]
.
Transform-Domain Techniques
.
Spread Spectrum
.
Example
.
More examples
.
DCT and JPEG
.
Watermarking with DCT
.
DCT-based Technique [Cox, Kilian , Leighton, and Shamoon97]
.
Cox et al. Procedure
.
Cox et al. cont'd
.
Cox et al. cont'd
.
Collusion Attack
.
Fourier Transform
.
Wavelets
.
Real Examples
.
Digimarc : http://www. digimarc .com/~ digimarc
.
Attacking Opportunities
.
Robustness Attacks
.
Robustness State of the Art for Images
.
Presentation Attack
.
Interpretation Attacks
.
Deadlock Attack
.
Craver et al. Deadlock Attack
.
Craver et al. Attack cont'd
.
Legal Attacks
.
Copyright Ownership Infrastructure [ Herrigel et al. 97]
.
Copyright Ownership Infrastructure
.
More Details
.
Deadlock Cannot Occur
.
Summary
.
Next lecture and readings
.
Back to
Lectures
Heather L. Marko
Last Modified: November 1998