Multipurpose Image Watermarking Method Based on Mean-removed Vector Quantization

被引:0
作者
Lu, Zhe-Ming [1 ]
Zheng, Wei-Min [2 ]
Pan, Jeng-Shyang [3 ]
Sun, Zhen [4 ]
机构
[1] Shenzhen Univ, Visual Informat Anal & Proc Res Ctr, Shenzhen Grad Sch, Harbin Inst Technol, Room 417,Bldg No. 4,HIT Campus, Shenzhen 518055, Peoples R China
[2] Chinese Acad Sci, Inst Comp Technol, Beijing 100080, Peoples R China
[3] Natl Kaohsiung Univ Appl Sci, Dept Elect Engn, Kaohsiung 807, Taiwan
[4] Harbin Inst Technol, Dept Automat Test & Control, Harbin 150001, Heilongjiang, Peoples R China
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2006年 / 1卷 / 01期
基金
中国国家自然科学基金;
关键词
Copyright protection; fragile watermarking; image authentication; mean-removed vector quantization; multipurpose watermarking; robust watermarking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital watermarking technique has been presented and widely researched to solve some important issues in the digital world, such as copyright protection, copy protection, and content authentication. Conventional watermarking algorithms are mostly based on discrete cosine transform (DCT), discrete Fourier transform (DFT), and discrete wavelet transform (DWT). Most of these algorithms are designed for only one purpose. In recent years, some multipurpose digital watermarking methods based on DWT and DFT have been presented to achieve the goal of both content authentication and copyright protection. Lately, several robust watermarking schemes based on vector quantization (VQ) have been presented, but they can be used only for copyright protection. In this paper, we present a novel multipurpose digital image watermarking method based on a mean-removed vector quantizer (MRVQ) structure. In the proposed method, the fragile watermark and the robust watermark are embedded in mean indices and residual indices using different techniques, and both of them can be blindly extracted. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility.
引用
收藏
页码:33 / 42
页数:10
相关论文
共 23 条
[1]   Toward secure public-key blockwise fragile authentication watermarking [J].
Barreto, PSLM ;
Kim, HY ;
Rijmen, V .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02) :57-62
[2]   Tracing data diffusion in industrial research with robust watermarking [J].
Busch, C ;
Wolthusen, SD .
2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2001, :207-212
[3]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]  
Huang HC, 2002, IEICE T FUND ELECTR, VE85A, P1719
[6]   Efficient and robust watermarking algorithm with vector quantisation [J].
Huang, HC ;
Wang, FH ;
Pan, JS .
ELECTRONICS LETTERS, 2001, 37 (13) :826-828
[7]  
Jo M, 2002, IEICE T INF SYST, VE85D, P1054
[8]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[9]   A watermarking sequence using parities of error control coding for image authentication and correction [J].
Lee, JJ ;
Won, CS .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (02) :313-317
[10]   ALGORITHM FOR VECTOR QUANTIZER DESIGN [J].
LINDE, Y ;
BUZO, A ;
GRAY, RM .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1980, 28 (01) :84-95