Martin Kutter
École Polytechnique Fédérale de Lausanne
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Martin Kutter.
Proceedings of the IEEE | 1999
Frank Hartung; Martin Kutter
Multimedia watermarking technology has evolved very quickly during the last few years. A digital watermark is information that is imperceptibly and robustly embedded in the host data such that it cannot be removed. A watermark typically contains information about the origin, status, or recipient of the host data. In this tutorial paper, the requirements and applications for watermarking are reviewed. Applications include copyright protection, data monitoring, and data tracking. The basic concepts of watermarking systems are outlined and illustrated with proposed watermarking methods for images, video, audio, text documents, and other media. Robustness and security aspects are discussed in detail. Finally, a few remarks are made about the state of the art and possible future developments in watermarking technology.
electronic imaging | 1999
Martin Kutter; Fabien A. P. Petitcolas
Since the early 90s a number of papers on robust digital watermarking systems have been presented but none of them uses the same robustness criteria. This is not practical at all for comparison and slows down progress in this area. To address this issue, we present an evaluation procedure of image watermarking systems. First we identify all necessary parameters for proper benchmarking and investigate how to quantitatively describe the image degradation introduced by the watermarking process. For this, we show the weaknesses of usual image quality measures in the context watermarking and propose a novel measure adapted to the human visual system. Then we show how to efficiently evaluate the watermark performance in such a way that fair comparisons between different methods are possible. The usefulness of three graphs: attack vs. visual-quality, bit-error vs. visual quality, and bit-error vs. attack are investigated. In addition the receiver operating characteristic (ROC) graphs are reviewed and proposed to describe statistical detection behavior of watermarking methods. Finally we review a number of attacks that any system should survive to be really useful and propose a benchmark and a set of different suitable images.
Storage and Retrieval for Image and Video Databases | 1997
Martin Kutter; Frédéric Jordan; Frank Bossen
Watermarking techniques, also referred to as digital signature, sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the signature is a number which identifies the owner of the image. The locations in the image where the signature is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the signature. Furthermore, it should be possible to retrieve the signature from an altered image. Possible alternations of signed images include blurring, compression and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single signature bits are multiply embedded by modifying pixel values in the blue channel. These modifications are either additive or subtractive, depending on the value of the bit, and proportional to the luminance. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the signature can be extracted without the original image.
Journal of Electronic Imaging | 1998
Martin Kutter; Frédéric Jordan; Frank Bossen
Keywords: LTS1 Reference LTS-ARTICLE-1998-011doi:10.1117/1.482648View record in Web of Science Record created on 2006-06-14, modified on 2016-08-08
international conference on image processing | 1999
Martin Kutter; Sushil K. Bhattacharjee; Touradj Ebrahimi
The digital watermarking schemes of today use pixels (samples in the case of audio), frequency or other transform coefficients to embed the information. The drawback of such schemes is that the watermark is not embedded in the perceptually significant portions of the data. We refer to such techniques as first generation watermarking schemes. In this paper we introduce the concept of second generation watermarking schemes which, unlike first generation watermarking schemes, employ the notion of data features. We propose a scheme based on point features in images using a scale interaction technique based on 2D continuous wavelets. The features are used to compute a Voronoi partition of the image. The watermark is embedded in each segment using spread spectrum watermarking. In the recovery process the same features are detected, and again used to partition the image. Then the watermark is extracted from each segment separately.
international conference on image processing | 1998
Sushil K. Bhattacharjee; Martin Kutter
It is straightforward to apply general schemes for authenticating digital data to the problem of authenticating digital images. However, such a scheme would not authenticate images that have undergone lossy compression, even though they may not have been manipulated otherwise. We propose a scheme for authenticating the visual content of digital images. This scheme is robust to compression noise, but will detect deliberate manipulation of the image-data. The proposed scheme is based on the extraction of feature-points from the image. These feature-points are defined so as to be relatively unaffected by lossy compression. The set of feature-points from a given image is encrypted using public key encryption, to generate the digital signature of the image. Authenticity is verified by comparing the feature-points of the image in question, with those recovered from the previously computed digital signature.
IEEE Transactions on Image Processing | 2002
Martin Kutter; Stefan Winkler
We present a perceptual model for hiding a spread-spectrum watermark of variable amplitude and density in an image. The model takes into account the sensitivity and masking behavior of the human visual system by means of a local isotropic contrast measure and a masking model. We compare the insertion of this watermark in luminance images and in the blue channel of color images. We also evaluate the robustness of such a watermark with respect to its embedding density. Our results show that this approach facilitates the insertion of a more robust watermark while preserving the visual quality of the original. Furthermore, we demonstrate that the maximum watermark density generally does not provide the best detection performance.
Multimedia systems and applications. Conference | 1999
Martin Kutter
In this paper we propose a new watermarking scheme for digital images that allows watermark recovery even if the image has been subjected to generalized geometrical transforms. The watermark is given by a binary number and every watermark bit is represented by a 2D function. The functions are weighted, using a mask that is proportional to the luminance, and then modulated onto the blue component of the image. To recover an embedded bit, the embedded watermark is estimated using a prediction filter. The sign of the correlation between the estimated watermark and the original function determine the embedded several times at horizontally and vertically shifted locations. In the watermark recovery process we first compute a prediction of the embedded watermark. Then the autocorrelation function is computed for this prediction. The multiple embedding of the watermark result in additional autocorrelation peaks. By comparing the configuration of the extracted peaks with their expected configuration we can determine the affine distortion applied to the image. The distortion can then be inverted and the watermark recovered in a standard way.
information hiding | 1999
Martin Kutter
In spread spectrum communication the use of M-ary modulation is a popular extension to binary signaling usually resulting in a significant performance improvement. Furthermore it was shown that for increasing M and for certain schemes M-ary modulation works at the channel capacity. In this work we investigated on how to use M-ary modulation in the context of spatial spread spectrum based watermarking schemes. The performance of M-ary watermarking schemes is theoretically analyzed and the results verified through empirical test. We show that in general M-ary modulation based on the biorthogonal extension of the Hadamard matrix results in a significant performance improvement for values of M > 4. Furthermore we show that the performance improvement does not decrease under noise like distortion such as lossy JPEG compression.
electronic imaging | 2000
Martin Kutter; Sviatoslav Voloshynovskiy; Alexander Herrigel
Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating different ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy the embedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. The proposed attack does not destroy an embedded watermark, but copies it from one image to a different image. Although this new attack does not destroy a watermark or impair its detection, it creates new challenges, especially when watermarks are used for copyright protection and identification. The process of copying the watermark requires neither algorithmic knowledge of the watermarking technology nor the watermarking key. The attack is based on an estimation of the embedded watermark in the spatial domain through a filtering process. The estimate of the watermark is then adapted and inserted into the target image. To illustrate the performance of the proposed attack we applied it to commercial and non-commercial watermarking schemes. The experiments showed that the attack is very effective in copying a watermark from one image to a different image. In addition, we have a closer look at application dependent implications of this new attack.