Using invisible watermarks to protect visibly watermarked images

Yongjian HU*, Sam KWONG, Jiwu HUANG

*Corresponding author for this work

Research output: Book Chapters | Papers in Conference ProceedingsConference paper (refereed)Researchpeer-review

21 Citations (Scopus)

Abstract

Physical visible watermarks have been widely used for centuries. Now digital visible watermarks such as electronic logos find their applications in digital library, video broadcasting, and other multimedia services. Several visible watermarking techniques have been proposed in the literature, and meanwhile, some problems with visible watermarks are also under investigation. Among these problems, watermark removal and unauthorized insertion are two major concerns. In this paper, we propose using an invisible watermark in visibly watermarked images to overcome these problems. When a visibly watermarked image is in question, the invisible watermark can provide appropriate ownership information. We first investigate what kind of invisible watermark is needed, and then, focus on the details of the invisible watermarking technique. The experiments have shown that the proposed algorithm can provide a very effective protection for visibly watermarked images.

Original languageEnglish
Title of host publicationProceedings of the 2004 IEEE International Symposium on Cirquits and Systems
PublisherIEEE
PagesV-584 - V-587
Number of pages4
Volume5
ISBN (Print)078038251X
DOIs
Publication statusPublished - 2004
Externally publishedYes
Event2004 IEEE International Symposium on Cirquits and Systems - Vancouver, BC, Canada
Duration: 23 May 200426 May 2004

Publication series

NameProceedings - IEEE International Symposium on Circuits and Systems
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISSN (Print)0271-4310

Conference

Conference2004 IEEE International Symposium on Cirquits and Systems
Country/TerritoryCanada
CityVancouver, BC
Period23/05/0426/05/04

Fingerprint

Dive into the research topics of 'Using invisible watermarks to protect visibly watermarked images'. Together they form a unique fingerprint.

Cite this