206
Views
27
CrossRef citations to date
0
Altmetric
Original Articles

Watermarking of digital geospatial datasets: a review of technical, legal and copyright issues

Pages 589-607 | Published online: 10 Nov 2010

References

  • ANDERSON , R. J. and PETITCOLAS , F. A. P. 1998 . On the limits of Steganography . IEEE Journal of Selected Areas in Communications , 16 : 474 – 481 .
  • BAND , J. 1999 . Making the World safe for databases. IP Magazine April 1999
  • BENDER , W. , GRUHL , D. , MORIMOTO , N. and Lu , A. 1996 . Techniques for data hiding . IBM Systems Journal , 35 : 313 – 336 .
  • BENEDENS , O. 1999 . Geometry-based watermarking of 3D models . IEEE Computer Graphics and Application , : 46 – 55 .
  • BRASSIL , J. , Low , S. H. , MAXEMCHUK , N. and O'GORMA , L. 1995 . Electronic marking and identification techniques to discourage document copying . IEEE Journal of Selected Areas in Communications , 13 : 1495 – 1504 .
  • CEC (COMMISSION OF THE EUROPEAN COMMUNITIES) . 1996 . Council Directive on the Legal Protection of Databases . COM , 95 : 382 Final. Official Journal of the European Communities, of 27/3/96. 31996L0009
  • Cox , I. J. and LINNARTZ , J. P. M. G. 1998 . Some general methods for tampering with watermarks . IEEE Journal on Selected Areas in Communications , 16 : 587 – 593 .
  • Cox , I. J. , KILIAN , J. , LEIGHTON , T. and SHAMOON , T. 1997 . Secure spread spectrum watermarking for multimedia . IEEE Transactions on Image Processing , 6 : 1673 – 1687 .
  • CRAVER , S. , MEMON , N. , YEO , B. L. and YEUNG , M. 1998 . Resolving rightful ownerships with invisible watermarking techniques limitations, attacks and implications . IEEE Journal on Selected Areas in Communications , 16 : 573 – 586 .
  • DATE , H. , KANAI , S. and KISHINAMI , T. Digital watermarking for 3D polygonal model based on wavelet transform . Proceedings of DETC'99—1999 ASME Design Engineering Technical Conferences . September 12–15 1999 , Las Vegas, Nevada. DETC99/CIE-9031
  • DELAIGLE , J. F. , VLEESCHOUWER , C. D. and MACQ , B. 1998 . Watermarking algorithm based on a human visual model . Signal Processing , 66 : 319 – 335 .
  • FREDRICSSON , P. 2000 . Vattenmärkning i digitala miljöer. (Watermarking in digital media) Unpublished manuscript in Swedish
  • GARLAND , M. 1999 . Multiresolution modeling survey and future opportunities. EUROGRAPHICS'99 , ISSN 1017-4956 111 – 131 .
  • GOPALAKRISHNAN , K. , MEMON , N. and VORA , P. Protocols for watermark verification . Proceedings of the Multimedia and Security Workshop (held as a part of the 7th annual ACM International Multimedia Conference at Orlando, Florida in Oct 1999), GMD Report No. 85 . December 1999 . pp. 91 – 94 .
  • KARJALA , D. 1995 . Copyright in electronic maps . Jurimetrics Journal , 35 : 395 – 415 .
  • KUTTER , M. and PETITCOLAS , F. A. P. 1999 . “ A fair benchmark for Image watermarking systems ” . In Security and Watermarking of Multimedia Contents , ISBN 0-8194-3128 Edited by: Wong , P. W. and Delp , E. J. 226 – 239 .
  • KUTTER , M. , JORDAN , F. and BOSSEN , F. 1998 . Digital signature of colour images using amplitude modulation . Journal of Electronic Imaging , 7 : 326 – 332 .
  • KUTTER , M. , VOLOSHYNOVSKIY , S. and HERRIGEL , A. The watermark copy attack . Proceedings of SPIE: Security and Watermarking of Multimedia Content II, 3971 . San José, CA
  • Low , S. H. and MAXEMCHUK , N. F. 1998 . Performance comparison of two text marking methods . IEEE Journal on Selected Areas in Communications , 16 : 561 – 572 .
  • Low , S. H. , MAXEMCHUK , N. F. and LAPONE , A. M. 1998 . Document identification for copyright protection using Centroid detection . IEEE Transactions and Communications , 46 : 372 – 383 .
  • MEMON , N. and WONG , P. W. A buyer-seller watermarking protocol . Proceedings of IEEE Workshop on Multimedia Signal Processing (MMSP-98) . December 7–9 , Los Angeles, California, US. pp. 278 – 283 .
  • MINTZER , F. C. , BOYLE , L. E. , CAZES , A. N. , CHRISTIAN , B. S. , COX , S. C. , GIORDANO , F. P. , GLADNEY , H. M. , LEE , J. C. , KELMANSON , M. L. , LIRANI , A. C. , MAGERLEIN , K. A. , PAVANI , A. M. B. and SCHIATTARELLA , F. 1996 . Towards on-line, worldwide access to Vatican Library materials . IBM Journal of Research and Development , 4
  • MONMONIER , M. 1996 . How to Lie with Maps, , 2nd edition , ISBN 0226534200 Chicago : University of Chicago Press .
  • NKOLAIDIS , N. and PITAS , I. Copyright protection of images using robust digital signatures . IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP-96) . Vol. 4 , pp. 2168 – 2171 .
  • NKOLAIDIS , N. and PITAS , I. 1998 . Robust image watermarking in the spatial domain . Signal Processing , 66 : 385 – 403 .
  • O'GORMAN , L. 1993 . The document spectrum for structural page layout analysis . IEEE Transactions on Pattern Analysis and Machine Intelligence , 15 : 1162 – 1173 .
  • OHBUCHI , R. , MASUDA , H. and AONO , M. 1997 . Watermarking three-dimensional polygonal models , ACM Multimedia 97 261 – 272 . London : ACM Press .
  • OHBUCHI , R. , MASUDA , H. and AONO , M. 1998 . Watermarking three-dimensionnal polygonal models through geometric and topological modifications . IEEE Journal on Selected Areas in Communications , 16 : 551 – 560 .
  • ONSRUD , H. J. and LÒPEZ , X. 1998 . “ Intellectual property rights in disseminating digital geographic data, products and services: conflicts and commonalities among European Union and United States approaches ” . In European Geographic Information Infrastructures: Opportunities and Pitfalls , Edited by: Masser , I. and Salgé , F. 153 – 167 . London : Taylor and Francis .
  • PETITCOLAS , F. and KUHN , M. 1997 . StirMark 2
  • PODILCHUK , C. and ZENG , W. 1998 . Image adaptive watermarking using visual models . IEEE Journal on Selected Areas in Communications , 16 : 525 – 540 .
  • PRAUN , E. , HOPPE , H. and FINKELSTEIN , A. Robust mesh watermarking. Computer Graphics . SIGGRAPH 1999 Proceedings . pp. 69 – 76 . Also available at
  • RAMKUMAR , M. 1999 . Data hiding in Multimedia—Theory and Applications , Newark, NJ : New Jersey Institute of Technology, Department of ECE, University Heights . Ph.D Dissertation
  • RAMKUMAR , M. and AKANSU , A. N. 1999 . Image watermarks and counterfeit attacks: some problems and solutions. Content Security and Data Hiding in Digital Media 102 – 112 . Newark, NJ
  • SCHNEIER , B. 1995 . Applied Cryptography: Protocols, Algorithms and Source Code , ISBN: 0471117099 Chichester, New York : John Wiley & Sons .
  • SERVETTO , S. D. , PODILCHUK , C. L and RAMCHANDRAN , K. Capacity issues in digital image watermarking . Proceedings of the IEEE International Conference on Image Processing . Chicago, IL.
  • Su , P. C. , WANG , H. J. and Kuo , C. C. J. Blind digital watermarking for cartoon and map images . Proceedings of SPIE Vol.3657, Security and Watermarking of Multimedia Contents . Edited by: Ping , Wah Wong and Delp , Edward J. pp. 296 – 306 .
  • THORNER , B. B. 1997 . Copyright protection for computer databases: the threat of Feist and a proposed solution . Virginia Journal of Law and Technology , 1
  • VAN SCHYNDEL , R. G. , TIRKEL , A. Z. and OSBORNE , C. F. A digital watermark . Proceedings of the IEEE International Conference on Image Processing (ICIP'94) . vol II , pp. 86 – 90 .
  • VOYATZIS , G. and PITAS , I. 1999 . Protecting digital-image copyrights: a framework . IEEE Computer Graphics and Applications , 19 : 18 – 24 .
  • YEO , B. L. and YEUNG , M. M. 1999 . Watermarking 3D objects for verification . IEEE Computer Graphics and Applications , : 36 – 45 .
  • ZENG , W. and LIU , B. 1999 . A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images . IEEE Transactions on Image Processing , 8 : 1534 – 1548 .
  • ZHAO , J. , KOCK , E. and Luo , C. 1998 . In business today and tomorrow . Communications of the ACM , 41 : 67 – 72 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.