WO2009074618A1 - Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks - Google Patents

Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks Download PDF

Info

Publication number
WO2009074618A1
WO2009074618A1 PCT/EP2008/067254 EP2008067254W WO2009074618A1 WO 2009074618 A1 WO2009074618 A1 WO 2009074618A1 EP 2008067254 W EP2008067254 W EP 2008067254W WO 2009074618 A1 WO2009074618 A1 WO 2009074618A1
Authority
WO
WIPO (PCT)
Prior art keywords
watermark
image
visible
values
pixels
Prior art date
Application number
PCT/EP2008/067254
Other languages
French (fr)
Inventor
Jean-François VIAL
Original Assignee
Thomson Licensing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing filed Critical Thomson Licensing
Priority to US12/735,006 priority Critical patent/US8635161B2/en
Priority to CN2008801197950A priority patent/CN101889433B/en
Priority to EP08860555A priority patent/EP2241101A1/en
Priority to JP2010537438A priority patent/JP5415446B2/en
Publication of WO2009074618A1 publication Critical patent/WO2009074618A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32208Spatial or amplitude domain methods involving changing the magnitude of selected pixels, e.g. overlay of information or super-imposition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32288Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image
    • H04N1/32299Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image using more than one embedding method
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32288Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image
    • H04N1/32304Embedding different sets of additional information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • H04N1/32325Robust embedding or watermarking the embedded data being visible
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32347Reversible embedding, i.e. lossless, invertible, erasable, removable or distorsion-free embedding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious

Definitions

  • the present invention relates generally to digital content processing, and in particular removable visible watermarking of images.
  • Visible watermarking of an image is a relatively simple technique that is divided into two main families: insertion of a little image in the original image, such as for example the logotype of a television channel in a corner, and semi-transparent superposition of a, generally binary, image of the same size as the original image.
  • the variables are: for I ⁇ i ⁇ I+M and J ⁇ j ⁇ J+N (i.e. inside the visible watermark): a, j is the transparency of the watermark (0 ⁇ a, j ⁇ 1 ) and by, is the value of the watermark pixel x (1 - a, j ).
  • p, j p v , J / a,, j .
  • a problem is that while it often is desirable to use visible watermarks in pictures, for example for copyright information, it may also be desirable to remove the visible watermark from the image. This may for example be the case in a system where a customer may freely download visibly watermarked images from a server and then buy the rights to use the image in its non- watermarked version.
  • the invention is directed to a method of watermarking an image. Values of pixels of the image to be covered by an opaque watermark are memorised, the opaque watermark is inserted in the image to obtain a visibly watermarked image, the memorised pixel values are protected to obtain protected information, and the protected information is inserted as an invisible watermark in the visibly watermarked image to obtain a visibly and invisibly watermarked image.
  • the memorised pixel values further comprises the position and size of the visible watermark in the visibly watermarked picture.
  • the protecting step comprises encrypting the memorised pixel values.
  • the invention is directed to a method of removing a visible watermark from an image that further comprises an invisible watermark.
  • the invisible watermark comprising protected values of pixels that are to replace the visible watermark is extracted and the protected information is unprotected to obtain values of pixels that are to replace the visible watermark.
  • the visible watermark is then removed by restoring the pixels for which the values were comprised in the invisible watermark.
  • the invention is directed to an apparatus for watermarking an image.
  • the apparatus comprises means for memorising values of pixels of the image to be covered by an opaque watermark, means for inserting the opaque watermark in the image to obtain a visibly watermarked image, means for protecting the memorised pixel values to obtain protected information, and means for inserting the protected information as an invisible watermark in the visibly watermarked image to obtain a visibly and invisibly watermarked image.
  • the means for inserting the protected information is further adapted to also insert the position and size of the visible watermark in the visibly watermarked picture.
  • the protecting means is an encryption module.
  • the invention is directed to an apparatus for removing a visible watermark from an image that further comprises an invisible watermark.
  • the apparatus comprises means for extracting the invisible watermark comprising protected values of pixels that are to replace the visible watermark, means for unprotecting the protected information to obtain values of pixels that are to replace the visible watermark, and means for removing the visible watermark by restoring the pixels for which the values were comprised in the invisible watermark.
  • FIG. 1 illustrates the general concept of the invention
  • Figure 2 illustrates insertion of watermarks according to a first preferred embodiment of the invention
  • FIG. 3 illustrates removal of watermarks according to the first preferred embodiment of the invention.
  • Figure 4 illustrates devices adapted to perform the methods of the first preferred embodiment.
  • FIG. 1 illustrates the general concept of the invention.
  • An original image 10 is watermarked 13 using a visible watermark 1 1 and a, preferably secret, key 12, which gives a watermarked image 14.
  • This watermarked image 14 may then be restored by removal 15 of the watermark 11 using the key 12, so as to obtain a restored image 16.
  • the person skilled in the art will appreciate that it is not always possible to obtain a restored image 16 that is identical to the original image 10, as small differences may appear during the insertion and removal of the visible watermark.
  • the general inventive concept of the invention is to insert the, preferably encrypted or otherwise protected, information necessary for removal of the visible watermark as an invisible watermark in the image itself.
  • Figure 2 illustrates insertion of watermarks according to a first preferred embodiment of the invention, wherein a small image T is inserted as a visible watermark.
  • the encryption algorithm may be symmetrical or asymmetrical.
  • the protected masked pixel information 26 is then inserted 27 as an invisible watermark into the visibly watermarked picture l v thus obtaining a visibly and invisibly watermarked image l V ⁇ -
  • any suitable technique for inserting an invisible watermark may be employed, as long as they provide an insertion capacity sufficient for inserting the protected masked pixel information 26 in the visibly watermarked picture Iv with little visual degradation thereto.
  • the insertion of a 64x64 pixel logo in a black and white image using 8 bits to represent each pixel requires an invisible watermark of 32768 bits, something that may easily triple, for a colour image, depending on format.
  • there is no need for a robust invisible watermark as a hacker has no interest whatsoever in removing the invisible watermark, since the invisible watermark contains the information necessary for the removal of the visible watermark.
  • the invisible watermark must be designed in order to resist to this lossy compression.
  • Figure 3 illustrates removal of watermarks according to the first preferred embodiment of the invention, wherein a small visible watermark T is removed.
  • a visibly and invisibly watermarked image l V ⁇ is received and the invisible watermark 26 is removed 31 from it.
  • the masked pixel information 26 is decrypted 32, and masked pixel information 22 is obtained.
  • the masked pixel information 22 may then be used to restore 34 the masked pixels, after which a restored image is obtained I R .
  • the restored image I R is then identical to the original image I 0 except for the losses caused by the invisible watermark.
  • the masked pixel information 22 comprises values of a, ,j and b ⁇ then further losses may appear owing to rounding up or down of calculation results.
  • Io is the original image of size M'xN', composed of pixels P 1J (0 ⁇ i ⁇ M', 0 ⁇ j ⁇ N').
  • the image T to be visibly watermarked in position I,J in I 0 is of size MxN and composed of pixels b, j .
  • the size of I 0 is at least seven times that of
  • TEMP contents of TEMP is then encrypted, for example using the AES algorithm:
  • the visible watermark may then be inserted, by replacing the pixels of Io by those of T:
  • the invisible watermark may then be inserted in the least significant bits of the pixels of l v :
  • the pixels p,, j now form image l V ⁇ and the method for inserting the watermarks is finished.
  • the invisible watermarking method is not part of the core of the invention, and that the one described in the present example has been chosen for its simplicity and would not resist to any lossy compression that may be applied to the watermarked image.
  • a watermark inserter 600 comprises one or more processors (hereinafter “processor”) 602, a user interface 604 and at least one memory (hereinafter “memory”) 606.
  • the watermark inserter 600 further comprises an input 610 and an output 612.
  • the input 610 is adapted to receive an original image and a watermark image, either from an external source or from the internal memory 606, and the output 612 is adapted to send a visibly and invisibly watermarked image l V ⁇ to another device, such as a watermark remover 650.
  • the watermark inserter 600 further comprises a pixel memorisation module 620, a visible watermark insertion module 625, an encryption module 630, and an invisible watermark insertion module 635.
  • the watermark inserter 600 comprises the necessary functional and structural entities needed for creating a visibly and invisibly watermarked image according to the first preferred embodiment of the invention.
  • the watermark remover 650 comprises a processor 652, a user interface 654 and a memory 656.
  • the watermark remover 650 further comprises an input 660 and an output 662.
  • the input 660 is adapted to receive, directly or indirectly, a visibly and invisibly watermarked image l V ⁇ from the watermark inserter 600, and the output 662 is adapted to render the restored image or to send it to another device.
  • the watermark remover 650 further comprises an invisible watermark extraction module 670, a decryption module 680, and a pixel restoration module 690.
  • the watermark remover 650 comprises the necessary functional and structural entities needed for restoring a visibly watermarked image according to the first preferred embodiment of the invention.
  • the present invention provides ways of inserting and removing visible watermarks into images, wherein the visible watermark may be removed using information in an invisible watermark in the image. It is possible to remove the watermarks using only information comprised in the image, except for, in preferred embodiments, a decryption key.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

A method of watermarking an image (lo). A visible watermark (T) is inserted (23) in the image (I0) to obtain a visibly watermarked image (lv). Information (22) allowing removal of the visible watermark (T) is protected (24) to obtain protected information (26) that is inserted (27) as an invisible watermark in the visibly watermarked image (lv) to obtain a visibly and invisibly watermarked image (lVι). The information (22) allowing removal of the visible watermark may be image values of the pixels to be covered by the visible watermark and, possibly, the position and size of the visible watermark, in which case these values are first memorised. The visible watermark may be opaque. Also provided are an apparatus for inserting the watermarks, a method for removing the visible watermark, essentially by performing the method 'in a mirror', and an apparatus for removing the visible watermark.

Description

METHOD AND APPARATUS FOR INSERTING A REMOVABLE VISIBLE
WATERMARK IN AN IMAGE AND METHOD AND APPARATUS FOR
REMOVING SUCH WATERMARKS
FIELD OF THE INVENTION
The present invention relates generally to digital content processing, and in particular removable visible watermarking of images.
BACKGROUND OF THE INVENTION
This section is intended to introduce the reader to various aspects of art, which may be related to various aspects of the present invention that are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present invention. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art.
Visible watermarking of an image is a relatively simple technique that is divided into two main families: insertion of a little image in the original image, such as for example the logotype of a television channel in a corner, and semi-transparent superposition of a, generally binary, image of the same size as the original image.
Most techniques for visible watermarking may be expressed by the equation:
Figure imgf000002_0001
where pv u is the value of visibly watermarked pixel i,j, p,,, the value of the pixel before watermarking, and ag and b,j are variables of the watermark.
For insertion of a little image in the original image having size M x N at coordinates I1J, the variables are: for I < i < I+M and J < j < J+N (i.e. inside the visible watermark): a,j is the transparency of the watermark (0 < a,j < 1 ) and by, is the value of the watermark pixel x (1 - a,j).
for i < I or i > I+M or j < J or j > J+N (i.e. outside the visible watermark): a, j = 1 and b,j = 0. In other words, the original image is not modified outside the watermark.
It follows that to remove the visible watermark, one may calculate p,,j from pv,j using pu = (pv u - b,,,)/ a,,, ; if a,,, ≠ 0.
For semi-transparent superposition of an image: a,,, is the value of the image pixel to superpose (0 < a,,j ≤ 1 ) and b,j = 0. To remove the watermark, one calculates p,j = pv,J / a,,j. A person skilled in the art will appreciate that in order to remove the visible watermark, one needs, in the first case, either a,,j and b,j or P1J if a,j = 0. If p,j represents an information mass smaller than a,j, then this may naturally be used directly, but it should be noted that a, j usually is constant for a particular image. In the second case, one needs either a,j or p,,,.
A problem is that while it often is desirable to use visible watermarks in pictures, for example for copyright information, it may also be desirable to remove the visible watermark from the image. This may for example be the case in a system where a customer may freely download visibly watermarked images from a server and then buy the rights to use the image in its non- watermarked version.
It may thus be seen that a problem lies in the way an end-user may obtain the information necessary for removal of the visible watermark.
One trivial solution to the problem is to download the non-watermarked version of the image.
Another solution is presented in "Copyright Protection and Authentication of Grayscale Images by Removable Visible Watermarking and Invisible Signal Embedding Techniques: A New Approach" by Pei-Ming Huang and Wen-Hsiang Tsai; 16th IPPR Conference on Computer Vision, Graphics and Image Processing (CVGIP 2003), August 2003. A binary logo is inserted as a visible watermark (semi transparent) and as an invisible watermark at the same position in the picture. In practice, the values of the pixels to be marked are multiplied by a factor k (0 < k < 1 ), for the visible watermark, and their least significant bit (LSB) is set to 1 while it is set to 0 for other pixels, for the invisible watermark. To remove the visible watermark, pixel values which have their LSB set to 1 are simply divided by k. A problem with this solution is that anyone can easily remove both the visible and invisible watermarks.
Published patent application US 2001/0004736 solves the problem by copying the part of the image into which the visible watermark is to be put. The watermark is then embedded as an invisible watermark in the copied information, and this is then encrypted. The encryption key and the position and size of the visible watermark are then encrypted using a second encryption key to create authentication information that is embedded as an invisible watermark in the original image (except for in the watermarked part). Finally, the twice watermarked original image and the encrypted watermarked copied information are then sent to the user. While this solution solves the problem, it is quite burdensome.
It can therefore be appreciated that there is a need for a solution that allows controlled removal visible watermarks that is simpler than the solutions of the prior art. This invention provides such a solution.
SUMMARY OF THE INVENTION
In a first aspect, the invention is directed to a method of watermarking an image. Values of pixels of the image to be covered by an opaque watermark are memorised, the opaque watermark is inserted in the image to obtain a visibly watermarked image, the memorised pixel values are protected to obtain protected information, and the protected information is inserted as an invisible watermark in the visibly watermarked image to obtain a visibly and invisibly watermarked image.
In a first preferred embodiment, the memorised pixel values further comprises the position and size of the visible watermark in the visibly watermarked picture.
In a second preferred embodiment, the protecting step comprises encrypting the memorised pixel values.
In a second aspect, the invention is directed to a method of removing a visible watermark from an image that further comprises an invisible watermark. The invisible watermark comprising protected values of pixels that are to replace the visible watermark is extracted and the protected information is unprotected to obtain values of pixels that are to replace the visible watermark. The visible watermark is then removed by restoring the pixels for which the values were comprised in the invisible watermark.
In a third aspect, the invention is directed to an apparatus for watermarking an image. The apparatus comprises means for memorising values of pixels of the image to be covered by an opaque watermark, means for inserting the opaque watermark in the image to obtain a visibly watermarked image, means for protecting the memorised pixel values to obtain protected information, and means for inserting the protected information as an invisible watermark in the visibly watermarked image to obtain a visibly and invisibly watermarked image.
In a first preferred embodiment, the means for inserting the protected information is further adapted to also insert the position and size of the visible watermark in the visibly watermarked picture. In a second preferred embodiment, the protecting means is an encryption module.
In a fourth aspect, the invention is directed to an apparatus for removing a visible watermark from an image that further comprises an invisible watermark. The apparatus comprises means for extracting the invisible watermark comprising protected values of pixels that are to replace the visible watermark, means for unprotecting the protected information to obtain values of pixels that are to replace the visible watermark, and means for removing the visible watermark by restoring the pixels for which the values were comprised in the invisible watermark.
BRIEF DESCRIPTION OF THE DRAWINGS
Preferred features of the present invention will now be described, by way of non-limiting example, with reference to the accompanying drawings, in which:
Figure 1 illustrates the general concept of the invention;
Figure 2 illustrates insertion of watermarks according to a first preferred embodiment of the invention;
Figure 3 illustrates removal of watermarks according to the first preferred embodiment of the invention; and
Figure 4 illustrates devices adapted to perform the methods of the first preferred embodiment.
PREFERRED EMBODIMENT OF THE INVENTION
Figure 1 illustrates the general concept of the invention. An original image 10 is watermarked 13 using a visible watermark 1 1 and a, preferably secret, key 12, which gives a watermarked image 14. This watermarked image 14 may then be restored by removal 15 of the watermark 11 using the key 12, so as to obtain a restored image 16. The person skilled in the art will appreciate that it is not always possible to obtain a restored image 16 that is identical to the original image 10, as small differences may appear during the insertion and removal of the visible watermark. The general inventive concept of the invention is to insert the, preferably encrypted or otherwise protected, information necessary for removal of the visible watermark as an invisible watermark in the image itself.
Figure 2 illustrates insertion of watermarks according to a first preferred embodiment of the invention, wherein a small image T is inserted as a visible watermark. In this example, the image T is opaque, i.e. a,j = 0.
When a visible watermark T is to be inserted in an original image lo, then the values of the pixels that will be masked by the watermark T are memorised
21 , which gives an extracted image 22. The watermark T may then be inserted 23 in the original image I0, thus giving a visibly watermarked image
Iv-
The skilled person will appreciate that in some cases when the image T is not opaque (a,j ≠ 0), it is equally possible, as an alternative, to memorise the values of the variables a,j and b,j instead of the values p,j of the pixels.
The masked pixel information 22, whether it be the values of the pixels p,,j or the values of the variables a,j and b,j, is then preferably encrypted 24 using a key 25 so as to obtain protected masked pixel information 26 that may also comprise information about the position and form or size of the visible watermark. The encryption algorithm may be symmetrical or asymmetrical.
The protected masked pixel information 26 is then inserted 27 as an invisible watermark into the visibly watermarked picture lv thus obtaining a visibly and invisibly watermarked image lVι-
Any suitable technique for inserting an invisible watermark may be employed, as long as they provide an insertion capacity sufficient for inserting the protected masked pixel information 26 in the visibly watermarked picture Iv with little visual degradation thereto. It should be noted that the insertion of a 64x64 pixel logo in a black and white image using 8 bits to represent each pixel requires an invisible watermark of 32768 bits, something that may easily triple, for a colour image, depending on format. On the other hand, there is no need for a robust invisible watermark, as a hacker has no interest whatsoever in removing the invisible watermark, since the invisible watermark contains the information necessary for the removal of the visible watermark. It should also be noted that if some lossy compression is to be applied to the watermarked image, the invisible watermark must be designed in order to resist to this lossy compression.
Figure 3 illustrates removal of watermarks according to the first preferred embodiment of the invention, wherein a small visible watermark T is removed. A visibly and invisibly watermarked image lVι is received and the invisible watermark 26 is removed 31 from it. Using a key 33, that depending on the encryption algorithm may be identical to the key 25 used for encryption, the masked pixel information 26 is decrypted 32, and masked pixel information 22 is obtained. The masked pixel information 22 may then be used to restore 34 the masked pixels, after which a restored image is obtained IR. The restored image IR is then identical to the original image I0 except for the losses caused by the invisible watermark. In case the masked pixel information 22 comprises values of a,,j and bφ then further losses may appear owing to rounding up or down of calculation results.
Exemplary algorithms for carrying out the methods of the first preferred embodiment will now be described in greater detail. Io is the original image of size M'xN', composed of pixels P1J (0 < i < M', 0 < j < N'). The bit at position b (0 < b < 8, b = 0 for the least significant bit) is denoted Pιj[b]. The image T to be visibly watermarked in position I,J in I0, is of size MxN and composed of pixels b,j. The size of I0 is at least seven times that of
Figure imgf000008_0001
First the pixels in I0 that will be replaced by those of T are stored in a temporary memory TEMP. Only the seven most significant bits need to be stored, as the least significant bit of all other pixels of the image will be used for the values of the invisible watermark: for i = 0 to M-1 for j=0to N-1 fork= 1 to 7 TEMP[C] <- pwjk] c<— c + 1 repeat repeat repeat
The contents of TEMP is then encrypted, for example using the AES algorithm:
encrypt TEMP with key K
The visible watermark may then be inserted, by replacing the pixels of Io by those of T:
for i = 0 to M-1 for \= Oto N-1
Figure imgf000009_0001
repeat repeat
The pixels p^j now form image Iv- The invisible watermark may then be inserted in the least significant bits of the pixels of lv:
fore = Oto 7 x M x N- 1 i <— c / N' /* Euclidian division */ J^ c modulo N' p JO] <- TEMP[C] repeat If the image I0 is fourteen times bigger (or more) than the watermark image T, then it is possible to repeat the invisible watermark at least once.
The pixels p,,j now form image lVι and the method for inserting the watermarks is finished.
It should be noted that the invisible watermarking method is not part of the core of the invention, and that the one described in the present example has been chosen for its simplicity and would not resist to any lossy compression that may be applied to the watermarked image.
To remove the visible watermark, the algorithm is performed in the reverse direction:
for c = 0 to 7 x M x N - 1 i <— c /N' /* Euclidian division 7 j <— c modulo N!
Figure imgf000010_0001
repeat decrypt TEMP with key K (or a corresponding key) c ^ O for i = 0 to M-1 forj = 0 to N-1 fork = 1 to 7
Figure imgf000010_0002
c <— c + 1 repeat repeat repeat The pixels p,j now form image IR, identical with I0 apart from, in all probability, in some of the least significant bits.
The algorithms for inserting and removing a visible watermark in the alternative where the masked pixel information comprises a,j and b,j instead of p,j will not be described, as it is believed that it is well within the competence of the skilled person to perform the necessary modifications.
In the description of Figure 4, certain elements are described as functional modules. It will be appreciated that these functional modules do not necessarily correspond to physical entities; they could for example be implemented in software, one or more hardware components, or a combination of the two.
Figure 4 illustrates devices adapted to perform the methods of the first preferred embodiment. A watermark inserter 600 comprises one or more processors (hereinafter "processor") 602, a user interface 604 and at least one memory (hereinafter "memory") 606. The watermark inserter 600 further comprises an input 610 and an output 612. The input 610 is adapted to receive an original image and a watermark image, either from an external source or from the internal memory 606, and the output 612 is adapted to send a visibly and invisibly watermarked image lVι to another device, such as a watermark remover 650.
The watermark inserter 600 further comprises a pixel memorisation module 620, a visible watermark insertion module 625, an encryption module 630, and an invisible watermark insertion module 635.
It will thus be appreciated that the watermark inserter 600 comprises the necessary functional and structural entities needed for creating a visibly and invisibly watermarked image according to the first preferred embodiment of the invention.
The watermark remover 650 comprises a processor 652, a user interface 654 and a memory 656. The watermark remover 650 further comprises an input 660 and an output 662. The input 660 is adapted to receive, directly or indirectly, a visibly and invisibly watermarked image lVι from the watermark inserter 600, and the output 662 is adapted to render the restored image or to send it to another device.
The watermark remover 650 further comprises an invisible watermark extraction module 670, a decryption module 680, and a pixel restoration module 690.
It will thus be appreciated that the watermark remover 650 comprises the necessary functional and structural entities needed for restoring a visibly watermarked image according to the first preferred embodiment of the invention.
It will be appreciated that, while the present invention has been described using still images as an example, it may also be employed for digital video, as this is a series of still images.
It will be further appreciated that while the invention has been described using black and white images, it may be easily adapted to colour images, for example by applying the described techniques to each component CrCb, RVB or CMJN, as the case may be.
It will also be appreciated that the present invention provides ways of inserting and removing visible watermarks into images, wherein the visible watermark may be removed using information in an invisible watermark in the image. It is possible to remove the watermarks using only information comprised in the image, except for, in preferred embodiments, a decryption key.
Each feature disclosed in the description and (where appropriate) the claims and drawings may be provided independently or in any appropriate combination. Features described as being implemented in hardware may also be implemented in software, and vice versa. Connections may, where applicable, be implemented as wireless connections or wired, not necessarily direct or dedicated, connections.
Reference numerals appearing in the claims are by way of illustration only and shall have no limiting effect on the scope of the claims.

Claims

1. A method of watermarking an image (I0) comprising the steps of:
- memorising (21 ) values of pixels of the image (lo) to be covered by an opaque watermark (T); - inserting (23) the opaque watermark (T) in the image (lo) to obtain a visibly watermarked image (lv);
- protecting (24) the memorised pixel values (22) to obtain protected information (26); and
- inserting (27) the protected information (26) as an invisible watermark in the visibly watermarked image (lv) to obtain a visibly and invisibly watermarked image (lVι)-
2. The method of claim 1 , wherein the memorised pixel values (22) further comprises the position and size of the visible watermark (T) in the visibly watermarked picture (lv).
3. The method of claim 1 , wherein the protecting step (24) comprises encrypting the memorised pixel values (22).
4. A method of removing a visible watermark (T) from an image (lVι) that further comprises an invisible watermark, the method comprising the steps of:
- extracting (31 , 51 ) the invisible watermark comprising protected values of pixels (26) that are to replace the visible watermark (T); - unprotecting (24) the protected information (26) to obtain values of pixels (26) that are to replace the visible watermark (T); and
- removing (34) the visible watermark (T) by restoring the pixels for which the values were comprised in the invisible watermark.
5. An apparatus for watermarking an image (I0) comprising:
- means (620) for memorising values of pixels of the image (I0) to be covered by an opaque watermark (T) - means (625) for inserting the opaque watermark (T) in the image (I0) to obtain a visibly watermarked image (lv);
- means (630) for protecting the memorised pixel values (22) to obtain protected information (26); and - means (635) for inserting the protected information (26) as an invisible watermark in the visibly watermarked image (lv) to obtain a visibly and invisibly watermarked image (lVι).
6. The apparatus of claim 5, wherein the means for inserting the protected information (635) is further adapted to also insert the position and size of the visible watermark (T) in the visibly watermarked picture (Iv)-
7. The apparatus of claim 5, wherein the protecting means (630) is an encryption module.
8. An apparatus for removing a visible watermark (T) from an image (lVι) that further comprises an invisible watermark, the apparatus comprising:
- means (670) for extracting the invisible watermark comprising protected values of pixels (26) that are to replace the visible watermark (T); - means (680) for unprotecting the protected information (26) to obtain values of pixels (22) that are to replace the visible watermark (T); and
- means (690) for removing the visible watermark (T) by restoring the pixels for which the values were comprised in the invisible watermark.
PCT/EP2008/067254 2007-12-13 2008-12-10 Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks WO2009074618A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US12/735,006 US8635161B2 (en) 2007-12-13 2008-12-10 Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
CN2008801197950A CN101889433B (en) 2007-12-13 2008-12-10 Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
EP08860555A EP2241101A1 (en) 2007-12-13 2008-12-10 Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
JP2010537438A JP5415446B2 (en) 2007-12-13 2008-12-10 Method and apparatus for inserting removable watermark into image and method and apparatus for removing the watermark

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP07301670.1 2007-12-13
EP07301670A EP2071822A1 (en) 2007-12-13 2007-12-13 Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks

Publications (1)

Publication Number Publication Date
WO2009074618A1 true WO2009074618A1 (en) 2009-06-18

Family

ID=39111569

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2008/067254 WO2009074618A1 (en) 2007-12-13 2008-12-10 Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks

Country Status (5)

Country Link
US (1) US8635161B2 (en)
EP (2) EP2071822A1 (en)
JP (1) JP5415446B2 (en)
CN (1) CN101889433B (en)
WO (1) WO2009074618A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2569547A (en) * 2017-12-19 2019-06-26 Samsung Electronics Co Ltd Reconstruction of original images from modified images

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8363884B2 (en) 2008-11-05 2013-01-29 International Business Machines Corporation Watermark hiding in designated applications
AU2010312302B2 (en) * 2009-10-29 2014-04-24 Optimark, L.L.C. Digital watermarking
NL2006658C2 (en) * 2011-04-22 2012-10-23 Media Cowboyz B V Method and system for detecting violation of intellectual property rights of a digital file.
US9275199B2 (en) 2011-06-28 2016-03-01 Link-Busters IP B.V. Method and system for detecting violation of intellectual property rights of a digital file
CN102271289B (en) * 2011-09-09 2013-03-27 南京大学 Method for embedding and extracting robust watermark in television (TV) program
US9635128B2 (en) 2011-11-02 2017-04-25 Photopon, Inc. System and method for experience-sharing within a computer network
WO2013067092A1 (en) * 2011-11-04 2013-05-10 Document Security Systems, Inc. System and method for dynamic generation of embedded security features in a document
PL403052A1 (en) * 2013-03-07 2014-09-15 Agnieszka Piotrowska Method and a filter for removing hidden data
FR3007166A1 (en) * 2013-06-17 2014-12-19 France Telecom METHOD, DEVICE, AND SYSTEM FOR PROTECTING AN IMAGE SIGNAL AGAINST COPY
JP6302194B2 (en) * 2013-09-07 2018-03-28 日本放送協会 Inverse multiplexing apparatus and program
CN105427228B (en) * 2015-10-29 2019-03-29 小米科技有限责任公司 Photo watermark handling method and device
WO2017110505A1 (en) * 2015-12-25 2017-06-29 株式会社リコー Image processing device, image display method, and program
CN106651805B (en) * 2016-12-28 2020-08-25 贵州大学 Image watermark removing method based on machine learning
CN107818538A (en) * 2017-09-27 2018-03-20 百度在线网络技术(北京)有限公司 Processing method, device, equipment and the computer-readable recording medium of watermarking images
US10645341B1 (en) * 2017-12-20 2020-05-05 Securus Technologies, Inc. Three-way video visitation detection using video cues
CN110197053B (en) * 2018-05-02 2023-07-14 腾讯科技(深圳)有限公司 Page generation method and device and electronic device
CN108833974B (en) * 2018-06-29 2021-05-18 北京奇虎科技有限公司 Method and device for removing semitransparent watermark in video and electronic equipment
CN110378831B (en) * 2019-07-19 2023-05-16 百度在线网络技术(北京)有限公司 Watermark processing method and device
CN110543749A (en) * 2019-08-15 2019-12-06 广州探迹科技有限公司 method and device for adding invisible watermark to client
CN115114598B (en) * 2022-06-28 2024-09-27 上海艺赛旗软件股份有限公司 Watermark generation method and device and watermark file tracing method and device
US20240037688A1 (en) * 2022-07-27 2024-02-01 GeoSnapshot Pty Ltd Inspection of digital images through watermarks

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030070075A1 (en) * 2001-10-04 2003-04-10 Frederic Deguillaume Secure hybrid robust watermarking resistant against tampering and copy-attack
US6574350B1 (en) * 1995-05-08 2003-06-03 Digimarc Corporation Digital watermarking employing both frail and robust watermarks
US20030179900A1 (en) * 2001-12-13 2003-09-25 Jun Tian Image processing methods using reversible watermarking
US20030202679A1 (en) * 2002-04-29 2003-10-30 The Boeing Company Watermarks for secure distribution of digital data

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6122403A (en) * 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US5530759A (en) * 1995-02-01 1996-06-25 International Business Machines Corporation Color correct digital watermarking of images
US5949885A (en) * 1996-03-12 1999-09-07 Leighton; F. Thomson Method for protecting content using watermarking
JP4053628B2 (en) * 1997-06-13 2008-02-27 インターシア ソフトウェア エルエルシー Digital content management system using digital watermark
US6643382B1 (en) * 1998-08-31 2003-11-04 Canon Kabushiki Kaisha Image processing method, image processing apparatus, image processing system and memory medium
US6345100B1 (en) * 1998-10-14 2002-02-05 Liquid Audio, Inc. Robust watermark method and apparatus for digital signals
GB2351409B (en) * 1999-03-18 2003-10-22 British Broadcasting Corp Watermarking
US6901514B1 (en) * 1999-06-01 2005-05-31 Digital Video Express, L.P. Secure oblivious watermarking using key-dependent mapping functions
WO2001010891A2 (en) * 1999-08-05 2001-02-15 Research Corporation Technologies, Inc. Il-16 antagonists
JP3748352B2 (en) 1999-12-16 2006-02-22 富士通株式会社 Data management method, recording medium for recording image generation method program, and recording medium for recording image restoration method program
US6707926B1 (en) * 2000-03-31 2004-03-16 Intel Corporation Template for watermark decoder synchronization
US6809792B1 (en) * 2000-10-09 2004-10-26 Eastman Kodak Company Spectral watermarking for motion picture image data
EP1231767B1 (en) * 2001-02-09 2011-04-13 Canon Kabushiki Kaisha Information processing apparatus and its control method, computer program, and storage medium
KR100426305B1 (en) * 2001-11-27 2004-04-08 한국전자통신연구원 Apparatus and method for embedding and extracting digital water mark using blind mode based on wavelet
US7561714B2 (en) * 2001-12-13 2009-07-14 Digimarc Corporation Reversible watermarking
US7515730B2 (en) 2001-12-13 2009-04-07 Digimarc Corporation Progressive image quality control using watermarking
US6954541B2 (en) * 2002-05-29 2005-10-11 Xerox Corporation Method of detecting changes occurring in image editing using watermarks
US7388606B2 (en) * 2002-10-02 2008-06-17 Harry Fox Method and apparatus for creating a digital picture with a watermark as well as removing the watermark from the digital picture
US20040151311A1 (en) * 2003-02-04 2004-08-05 Max Hamberg Encrypted photo archive
SG121783A1 (en) * 2003-07-29 2006-05-26 Sony Corp Techniques and systems for embedding and detectingwatermarks in digital data
JP4507189B2 (en) * 2004-02-18 2010-07-21 株式会社リコー Image processing method, apparatus, program, and recording medium
CN100419791C (en) * 2006-10-26 2008-09-17 丹东东方测控技术有限公司 Method for removing visual watermark of block local encrypted digital image
US8363884B2 (en) * 2008-11-05 2013-01-29 International Business Machines Corporation Watermark hiding in designated applications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6574350B1 (en) * 1995-05-08 2003-06-03 Digimarc Corporation Digital watermarking employing both frail and robust watermarks
US20030070075A1 (en) * 2001-10-04 2003-04-10 Frederic Deguillaume Secure hybrid robust watermarking resistant against tampering and copy-attack
US20030179900A1 (en) * 2001-12-13 2003-09-25 Jun Tian Image processing methods using reversible watermarking
US20030202679A1 (en) * 2002-04-29 2003-10-30 The Boeing Company Watermarks for secure distribution of digital data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2569547A (en) * 2017-12-19 2019-06-26 Samsung Electronics Co Ltd Reconstruction of original images from modified images
GB2569547B (en) * 2017-12-19 2021-05-12 Samsung Electronics Co Ltd Reconstruction of original images from modified images
US11455757B2 (en) 2017-12-19 2022-09-27 Samsung Electronics Co., Ltd. Method and apparatus for reconstruction of original images from modified images

Also Published As

Publication number Publication date
US20100254569A1 (en) 2010-10-07
EP2071822A1 (en) 2009-06-17
JP2011508480A (en) 2011-03-10
US8635161B2 (en) 2014-01-21
CN101889433A (en) 2010-11-17
CN101889433B (en) 2012-06-13
EP2241101A1 (en) 2010-10-20
JP5415446B2 (en) 2014-02-12

Similar Documents

Publication Publication Date Title
US8635161B2 (en) Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
Wang et al. Automatic image authentication and recovery using fractal code embedding and image inpainting
US6064764A (en) Fragile watermarks for detecting tampering in images
KR100265143B1 (en) An invisible image watermark for image verification
Queluz Authentication of digital images and video: Generic models and a new contribution
WO2003021861A1 (en) A system and method for protecting the content of digital cinema products
CN112040086A (en) Image encryption and decryption method and device, equipment and readable storage medium
Bhautmage et al. Advanced video steganography algorithm
CN108681982A (en) A kind of embedding algorithm and extracting method and system based on singular value decomposition
Jithi et al. Progressive visual cryptography with watermarking for meaningful shares
KR101200345B1 (en) Block-bases image authentication method using reversible watermarking based on progressive differential histogram
JP4654330B2 (en) Video change device, video change method, and video change program
Ridzoň et al. Content protection in grayscale and color images based on robust digital watermarking
Lin et al. Color image authentication with tamper detection and remedy based on BCH and Bayer pattern
JP2000184173A (en) Method and device for picture processing, method and system for picture delivery, and computer readable storage medium
Anumol et al. Enhanced security in medical image steganography-a hybrid approach using spatial and transform domain
Padeppagol et al. Design and implementation of lifting based wavelet and adaptive LSB steganography to secret data sharing through image on FPGA
KR101518664B1 (en) Method and apparatus for inserting watermarking based bit plane
JP2003179746A (en) Method for inserting binary messages in digital image
Kumar et al. Reversible watermarking scheme for medical images
Jimson et al. Removable Visible Watermarking Using Discrete Fourier Transform
Kaur et al. DCT and thresholding based digital video watermarking
Burdescu et al. A spatial watermarking algorithm for video images
Dhevanandhini et al. A Very Large Scale Integration Implementation of Streaming Video Watermarking
JPH10191025A (en) Information embedding device for digital image

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200880119795.0

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08860555

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2008860555

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2008860555

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2010537438

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 12735006

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE