Abstract

We describe an electro-optical method of deciphering a watermark from a recently invented encoded image termed a concealogram. The watermark is revealed as a result of spatial correlation between two concealograms, one containing the watermark and the other containing the deciphering key. The two are placed side by side on the input plane of a modified joint-transform correlator. When the input plane is illuminated by a plane wave, the watermark image is reconstructed on part of the correlator’s output plane. The key function deciphers the concealed watermark from the visible picture only when the two specific concealograms are matched. To illustrate the system’s performance, both simulation and experimental results are presented.

© 2005 Optical Society of America

PDF Article

References

  • View by:
  • |
  • |
  • |

  1. W. Bender, D. Gruhl, N. Morimoto, L. Lu, “Techniques for data hiding,” IBM Syst. J. 35, 313–336 (1996).
    [CrossRef]
  2. D. Grover, “Steganography and watermarking of digital data,” Computer Law Security Rep. 17, 101–104 (2001).
    [CrossRef]
  3. N. F. Johnson, Z. Duric, S. Jajodia, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures, Vol. 1 of Advances in Information Security, S. Jajodia, ed. (Kluwer Academic, Boston, Mass., 2001).
  4. G. C. Langelaar, I. Setyawan, R. L. Lagendijk, “Watermarking digital image and video data. A state of the art overview,” IEEE Signal Proc. Mag. 17, 20–46 (2000).
    [CrossRef]
  5. S. Kishk, B. Javidi, “3D object watermarking by a 3D hidden object,” Opt. Express 11, 874–888 (2003) http://www.opticsexpress.org .
    [CrossRef] [PubMed]
  6. J. Rosen, B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001).
    [CrossRef]
  7. J. Rosen, B. Javidi, H. Goldenfeld, S. Moshkovits, “Concealogram: an image within an image,” in Algorithms and Systems for Optical Information Processing VI, B. Javidi, D. Psaltis, eds., Proc. SPIE4789, 44–54 (2002).
  8. O. Bryngdahl, T. Scheermesser, F. Wyrowski, “Digital halftoning: synthesis of binary images,” in Progress in Optics, E. Wolf, ed. (North-Holland, Amsterdam, 1994), Vol. 33, pp. 389–463.
  9. D. Abookasis, O. Arazi, J. Rosen, B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).
    [CrossRef]
  10. C. S. Weaver, J. W. Goodman, “A technique for optically convolving two functions,” Appl. Opt. 5, 1248–1249 (1966).
    [CrossRef] [PubMed]
  11. A. VanderLugt, “Signal detection by complex spatial filtering,” IEEE Trans. Inf. Theory IT-10, 139–146 (1964).
  12. A. W. Lohmann, D. P. Paris, “Binary Fraunhofer holograms generated by computer,” Appl. Opt. 6, 1739–1748 (1967).
    [CrossRef] [PubMed]

2003

2001

J. Rosen, B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001).
[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).
[CrossRef]

D. Grover, “Steganography and watermarking of digital data,” Computer Law Security Rep. 17, 101–104 (2001).
[CrossRef]

2000

G. C. Langelaar, I. Setyawan, R. L. Lagendijk, “Watermarking digital image and video data. A state of the art overview,” IEEE Signal Proc. Mag. 17, 20–46 (2000).
[CrossRef]

1996

W. Bender, D. Gruhl, N. Morimoto, L. Lu, “Techniques for data hiding,” IBM Syst. J. 35, 313–336 (1996).
[CrossRef]

1967

1966

1964

A. VanderLugt, “Signal detection by complex spatial filtering,” IEEE Trans. Inf. Theory IT-10, 139–146 (1964).

Abookasis, D.

D. Abookasis, O. Arazi, J. Rosen, B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).
[CrossRef]

Arazi, O.

D. Abookasis, O. Arazi, J. Rosen, B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).
[CrossRef]

Bender, W.

W. Bender, D. Gruhl, N. Morimoto, L. Lu, “Techniques for data hiding,” IBM Syst. J. 35, 313–336 (1996).
[CrossRef]

Bryngdahl, O.

O. Bryngdahl, T. Scheermesser, F. Wyrowski, “Digital halftoning: synthesis of binary images,” in Progress in Optics, E. Wolf, ed. (North-Holland, Amsterdam, 1994), Vol. 33, pp. 389–463.

Duric, Z.

N. F. Johnson, Z. Duric, S. Jajodia, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures, Vol. 1 of Advances in Information Security, S. Jajodia, ed. (Kluwer Academic, Boston, Mass., 2001).

Goldenfeld, H.

J. Rosen, B. Javidi, H. Goldenfeld, S. Moshkovits, “Concealogram: an image within an image,” in Algorithms and Systems for Optical Information Processing VI, B. Javidi, D. Psaltis, eds., Proc. SPIE4789, 44–54 (2002).

Goodman, J. W.

Grover, D.

D. Grover, “Steganography and watermarking of digital data,” Computer Law Security Rep. 17, 101–104 (2001).
[CrossRef]

Gruhl, D.

W. Bender, D. Gruhl, N. Morimoto, L. Lu, “Techniques for data hiding,” IBM Syst. J. 35, 313–336 (1996).
[CrossRef]

Jajodia, S.

N. F. Johnson, Z. Duric, S. Jajodia, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures, Vol. 1 of Advances in Information Security, S. Jajodia, ed. (Kluwer Academic, Boston, Mass., 2001).

Javidi, B.

S. Kishk, B. Javidi, “3D object watermarking by a 3D hidden object,” Opt. Express 11, 874–888 (2003) http://www.opticsexpress.org .
[CrossRef] [PubMed]

D. Abookasis, O. Arazi, J. Rosen, B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).
[CrossRef]

J. Rosen, B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001).
[CrossRef]

J. Rosen, B. Javidi, H. Goldenfeld, S. Moshkovits, “Concealogram: an image within an image,” in Algorithms and Systems for Optical Information Processing VI, B. Javidi, D. Psaltis, eds., Proc. SPIE4789, 44–54 (2002).

Johnson, N. F.

N. F. Johnson, Z. Duric, S. Jajodia, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures, Vol. 1 of Advances in Information Security, S. Jajodia, ed. (Kluwer Academic, Boston, Mass., 2001).

Kishk, S.

Lagendijk, R. L.

G. C. Langelaar, I. Setyawan, R. L. Lagendijk, “Watermarking digital image and video data. A state of the art overview,” IEEE Signal Proc. Mag. 17, 20–46 (2000).
[CrossRef]

Langelaar, G. C.

G. C. Langelaar, I. Setyawan, R. L. Lagendijk, “Watermarking digital image and video data. A state of the art overview,” IEEE Signal Proc. Mag. 17, 20–46 (2000).
[CrossRef]

Lohmann, A. W.

Lu, L.

W. Bender, D. Gruhl, N. Morimoto, L. Lu, “Techniques for data hiding,” IBM Syst. J. 35, 313–336 (1996).
[CrossRef]

Morimoto, N.

W. Bender, D. Gruhl, N. Morimoto, L. Lu, “Techniques for data hiding,” IBM Syst. J. 35, 313–336 (1996).
[CrossRef]

Moshkovits, S.

J. Rosen, B. Javidi, H. Goldenfeld, S. Moshkovits, “Concealogram: an image within an image,” in Algorithms and Systems for Optical Information Processing VI, B. Javidi, D. Psaltis, eds., Proc. SPIE4789, 44–54 (2002).

Paris, D. P.

Rosen, J.

J. Rosen, B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001).
[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).
[CrossRef]

J. Rosen, B. Javidi, H. Goldenfeld, S. Moshkovits, “Concealogram: an image within an image,” in Algorithms and Systems for Optical Information Processing VI, B. Javidi, D. Psaltis, eds., Proc. SPIE4789, 44–54 (2002).

Scheermesser, T.

O. Bryngdahl, T. Scheermesser, F. Wyrowski, “Digital halftoning: synthesis of binary images,” in Progress in Optics, E. Wolf, ed. (North-Holland, Amsterdam, 1994), Vol. 33, pp. 389–463.

Setyawan, I.

G. C. Langelaar, I. Setyawan, R. L. Lagendijk, “Watermarking digital image and video data. A state of the art overview,” IEEE Signal Proc. Mag. 17, 20–46 (2000).
[CrossRef]

VanderLugt, A.

A. VanderLugt, “Signal detection by complex spatial filtering,” IEEE Trans. Inf. Theory IT-10, 139–146 (1964).

Weaver, C. S.

Wyrowski, F.

O. Bryngdahl, T. Scheermesser, F. Wyrowski, “Digital halftoning: synthesis of binary images,” in Progress in Optics, E. Wolf, ed. (North-Holland, Amsterdam, 1994), Vol. 33, pp. 389–463.

Appl. Opt.

Computer Law Security Rep.

D. Grover, “Steganography and watermarking of digital data,” Computer Law Security Rep. 17, 101–104 (2001).
[CrossRef]

IBM Syst. J.

W. Bender, D. Gruhl, N. Morimoto, L. Lu, “Techniques for data hiding,” IBM Syst. J. 35, 313–336 (1996).
[CrossRef]

IEEE Signal Proc. Mag.

G. C. Langelaar, I. Setyawan, R. L. Lagendijk, “Watermarking digital image and video data. A state of the art overview,” IEEE Signal Proc. Mag. 17, 20–46 (2000).
[CrossRef]

IEEE Trans. Inf. Theory

A. VanderLugt, “Signal detection by complex spatial filtering,” IEEE Trans. Inf. Theory IT-10, 139–146 (1964).

Opt. Eng.

D. Abookasis, O. Arazi, J. Rosen, B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).
[CrossRef]

Opt. Express

Other

J. Rosen, B. Javidi, H. Goldenfeld, S. Moshkovits, “Concealogram: an image within an image,” in Algorithms and Systems for Optical Information Processing VI, B. Javidi, D. Psaltis, eds., Proc. SPIE4789, 44–54 (2002).

O. Bryngdahl, T. Scheermesser, F. Wyrowski, “Digital halftoning: synthesis of binary images,” in Progress in Optics, E. Wolf, ed. (North-Holland, Amsterdam, 1994), Vol. 33, pp. 389–463.

N. F. Johnson, Z. Duric, S. Jajodia, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures, Vol. 1 of Advances in Information Security, S. Jajodia, ed. (Kluwer Academic, Boston, Mass., 2001).

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Metrics