DCT-OFDM Based Watermarking Scheme Robust Against Clipping, Rotation, and Scaling Attacks
详细信息    查看全文
  • 关键词:JPEG compression ; Clipping attack ; Synchronization signal ; Rotation attack ; Scaling attack ; Convolutional code
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:9569
  • 期:1
  • 页码:271-284
  • 全文大小:388 KB
  • 参考文献:1.Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 98. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998)CrossRef
    2.Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Trans. Signal Process. 17(5), 58–64 (2000)CrossRef
    3.IHC Committee. IHC Evaluation Criteria and Competition. http://​www.​ieice.​org/​iss/​emm/​ihc/​IHC_​criteriaVer4.​pdf
    4.Hakka, M., Kuribayashi, M., Morii, M.: DCT-OFDM based watermarking scheme robust against clipping attack. In: Proceedings of IWIHC 2014, pp. 18–24 (2014)
    5.Cox, I., Kilian, J., Leighton, F., Shamson, T.: Secure spreadspectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)CrossRef
    6.Malvar, H.S., Florêncio, D.A.F.: Improved spreadspectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51(4), 898–905 (2003)MathSciNet CrossRef
    7.Maximal, R.G.: Recursive sequences with 3-valued recursivecross-correlation functions. IEEE Trans. Inf. Theor. 14(3), 154–156 (1968)
    8.Viterbi, A.J.: Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Trans. Inf. Theor. 13(2), 260–269 (1967)CrossRef MATH
    9.Siozaki, A.: Basis of Information and Coding Theory. Ohmsha, Ltd. (2011)
    10.Gallager, R.G.: Low Density Parity Check Codes. M.I.T. Press, Cambridge (1963)MATH
    11.Hirata, N., Kawamura, M.: Digital watermarking method using LDPC code for clipped image. In: Proceedings of IWIHC 2014, pp. 25–30. ACM (2014)
    12.Chen, B., Wornell, G.W.: Quantization index modulation: aclass of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theor. 47(4), 1423–1443 (2001)MathSciNet CrossRef MATH
  • 作者单位:Hiroaki Ogawa (17)
    Minoru Kuribayashi (18)
    Motoi Iwata (17)
    Koichi Kise (17)

    17. Graduate School of Engineering, Osaka Prefecture University, 1-1 Gakuencho, Naka, Sakai, Osaka, 599-8531, Japan
    18. Graduate School of Natural Science and Technology, Okayama University, 3-1-1, Tsushima-naka, Kita-ku, Okayama, 700-8530, Japan
  • 丛书名:Digital-Forensics and Watermarking
  • ISBN:978-3-319-31960-5
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
文摘
The digital watermark is used for copyright protection, and the methods should have the robustness against various attacks such as JPEG compression, clipping, rotation, and scaling attacks. Based on the DCT-OFDM based watermarking method presented at IWIHC2014, we propose a method enhancing the performance in this paper. There are two ideas in the proposed method. One idea is to reduce the computational costs required for the synchronization recovery. The other idea is to encode watermark information by error correcting code and to decode it by maximum likelihood algorithm. As the result, our method has high robustness against the IHC evaluation criteria with less degradation of quality and less computational costs.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700