Abstract
The growth of networked multimedia systems has
created a need for the copyright protection of digital
images. Copyright protection involves the
authentication of image ownership and the
identification of illegal copies of a (possibly forged)
image. One approach is to mark an image by adding
an invisible structure known as a digital watermark.
In this paper we further study techniques for marking
images introduced in [1]. In particular, we describe
how our techniques withstand random errors. We also
provide more details relative to our verification
procedure. Finally, we discuss the recently proposed
IBM attack.