comes as an essential tool. But there are many kinds
of watermarking techniques. As an illustration, in
(Furon, 2002), the watermarking is highly bound to
the signal processing and is tailored to protect the
copy rights, thus the robustness is assumed. In this
article, the watermarking definition will be based on
the works of Cox et al. (Cox et al., 2008): ”water-
marking [is] the practice of imperceptibly altering a
Work to embed a message about that work” where the
work is ”a specific song, video or picture – or to a
specific copy of such”.
Mark detection or extraction process depends of
the targeted watermarking-characteristics. If original
work is required in such process, it is called an in-
formed watermarking, else it is a blind watermark-
ing (Kundur and Hatzinakos, 1999; Eggers and Girod,
2001).
Every watermarking modify the work (or host).
However, the host has different formats (equivalent
in term of information, but different presentation). As
far as image is concerned, two major insertion do-
main can be considered. The spatial domain – like a
bitmap – is a traditional visual representation, a.k.a.
raw format. It is a three dimensional array in which
the first two dimensions are position information, and
the last is colour information. The most famous wa-
termarking using this domain is the Mintzer-Yeung al-
gorithm (Mintzer and Yeung, 1997) which has been
further analysed by Fridrich et al. in (Fridrich et al.,
2002). The second domain is called frequential do-
main. Many transform are used to convert a spatial
representation to a frequential one. Interest of such
techniques is to benefit the frequencies periodicity for
compression purpose. As an example Lin and Chang
use this domain to embed a mark in (Lin and Chang,
2000). For other algorithm using wavelets, readers
can refer to (Kundur and Hatzinakos, 1999).
2.2 Properties
The principal property of a watermarking algorithm
is robustness (Atupelage and Harada, 2008; Cayre
et al., 2005; Furon, 2005; Lin et al., 2000; zgr Ekici
et al., 2004; Rey and Dugelay, 2000). A watermark
is called robust when it achieves a high degree of ro-
bustness, meaning that modifications do not erase the
mark (thought they can degrade it). An example can
be found in (Rey and Dugelay, 2000), where robust-
ness is use to distinguish malicious manipulations of
images. On the contrary a fragile watermark has the
lowest robustness, as the watermark disappear with
the slightest modification. That process is used by
Wong (Wong, 1998) to verify authentication and in-
tegrity of a digital image. In between stands the semi-
PSNR = 10 · log
10
d
2
EQM
(1)
EQM =
1
mn
m−1
∑
i=0
n−1
∑
j=0
||I
o
(i, j) − I
r
(i, j)||
2
(2)
Figure 1: I
o
original image, I
r
watermarked image.
fragile watermark, which is robust to a finite set of
modifications and fragile to all others. Exempli gra-
tia (Lin and Chang, 2000), authors proposed a water-
marking technique which is robust to JPEG compres-
sion.
Watermarking an image consist in embedding new
information into host, id est by modifying the host it-
self. Speaking of digital imagery, imperceptibility, as
original quality preservation, is required (Fei et al.,
2006; Kundur and Hatzinakos, 1999; Lin et al., 2000;
Fridrich, 1998). It can be stated that watermark im-
perceptibility has to meaning: human eye impercepti-
bility and computer imperceptibility. In both case, the
actor must be unable to distinct original image from
watermarked image. A way to measure the impercep-
tibility is PSNR (Peak Signal-to-Noise Ratio - see 1
and (Petitcolas. and Anderson, 1999)). In signal pro-
cessing community, it is admitted than 38dB is a good
PSNR. As an example, the watermarking algorithm
of Kundur and Hatzinakos (Kundur and Hatzinakos,
1999) provide a ratio of 43dB. Insertion rate is the
amount of information which can be stored in an im-
age watermark. It is also called capacity. In copy
control scenario, the capacity may be low. On the
contrary it must be high for indexation cases. Tech-
nics like matrix embedding proposed in (Fridrich and
Soukal, 2006) are used to increase the capacity of a
watermarking algorithm without increasing the image
degradation. For embedded application (such as mo-
bile equipment, video surveillance, etc), algorithms
have to be adequate with the mobiles capabilities, and
specifically for real-time applications. Complexity is
the indicator that will measure the watermarking pro-
cess fit (Atupelage and Harada, 2008; Fei et al., 2006;
Fridrich, 1998). An analogy can be made with paper
copies, within the process the screen imperfections
can induce anomalies, but the legal value remains the
same. This notion can be transferred to watermarking
algorithms by the notion of localisation. The princi-
ple is to include integrity checking into the process
(Atupelage and Harada, 2008; Lin et al., 2000). De-
tection can reveal defective areas and genuine areas.
2.3 Watermarking Algorithm’s Security
As we can see by the non-exhaustive enumeration of
PECCS 2011 - International Conference on Pervasive and Embedded Computing and Communication Systems
528