Paper
7 September 1998 Key issues for watermarking digital images
Daniel Augot, Chantal Fontaine
Author Affiliations +
Proceedings Volume 3409, Electronic Imaging: Processing, Printing, and Publishing in Color; (1998) https://doi.org/10.1117/12.324108
Event: SYBEN-Broadband European Networks and Electronic Image Capture and Publishing, 1998, Zurich, Switzerland
Abstract
This paper discusses secure architecture and protocols of managing Intellectual Property Rights in distributed content databases in a close environment. This discussion has been conducted within the European project AQUARELLE. This paper presents a short survey of watermarking technologies and focuses on functionalities offered by such techniques. We propose the terms of watermarking, fingerprinting and monitoring. For our implementation, we have worked with the Universite catholique de Louvain (UCL). This work is joint work with Jean-Francois Delaigle. Next we focus mainly on keys issues, and conclude that a trusted third party is needed to establish a verification service of watermarks. Next the DHWM key exchange is presented, based on the simple idea that watermarking and verification can be separated. This scheme uses the Diffie-Hellman key-exchange protocol. Next some hints on the implementation of the scheme and on its correctness are given.
© (1998) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Daniel Augot and Chantal Fontaine "Key issues for watermarking digital images", Proc. SPIE 3409, Electronic Imaging: Processing, Printing, and Publishing in Color, (7 September 1998); https://doi.org/10.1117/12.324108
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Targeting Task Performance metric

Databases

Computer security

Data hiding

Image compression

Fuzzy logic

RELATED CONTENT

Image retrieval based on data hiding
Proceedings of SPIE (August 01 2001)
Type enforcement: the new security model
Proceedings of SPIE (January 19 1996)
SmartSearch steganalysis
Proceedings of SPIE (June 20 2003)

Back to Top