A robust watermarking scheme based on least significant bit and discrete cosine transform

被引:0
作者
Fu-An, Zhou [1 ]
机构
[1] Beijing Technology and Business University, China
来源
International Journal of Security and its Applications | 2015年 / 9卷 / 04期
关键词
Discrete cosine transform; Least significant bit; Watermarking;
D O I
10.14257/ijsia.2015.9.4.17
中图分类号
学科分类号
摘要
In this paper, an image watermarking scheme is presented, in which Least Significant Bit and discrete cosine transform are used. The discrete cosine transform is performed on the original host image, and the secret watermark image is embedded into the coefficient of discrete cosine transform, which will replace the least significant bit. The embedded secret watermark bit will cause minimal distortion of the original host image, but we cannot find the difference of the original host image and the watermarked image. The experiment based on this algorithm demonstrates that the watermarking is robust to the common signal processing techniques, including noise attack, JPEG Compression attack and so on. © 2015 SERSC.
引用
收藏
页码:175 / 184
页数:9
相关论文
共 9 条
[1]  
Ishihara N., Abe K., A Semi fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication, IEICE Trans Fundam., E90-A, no.5, pp. 1045-1054, (2007)
[2]  
Tjokorda Agung A., Adiwijaya B.W., Permana F.P., Medical Image Watermarking with Tamper Detection and Recovery Using Reversible Watermarking with LSB Modification and Run Length Encoding (RLE) Compression, COMNETSAT, pp. 167-171, (2012)
[3]  
Duan G.D., Zhao X., A Novel Semi-fragile Digital Watermarking Algorithm for Image Content Authentication, Localization and Recovery, Acta Electronica Sinica, pp. 842-847, (2010)
[4]  
Lou D.C., Hu C.H., LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis, Information Sciences, 188, 4, pp. 346-358, (2012)
[5]  
Saha B., Sharma S., Steganographic techniques of data hiding using digital images, Defence Science Journal, 62, 1, pp. 11-18, (2012)
[6]  
Hassan Y.M.Y., Hassan A.M., Tamper Detection with Self Correction Hybrid Spatial-DCT Domains Image Authentication Technique, Communication Systems Software and Middleware and Workshops COMSWARE, pp. 608-613, (2008)
[7]  
Cao L.N., Chen Y.J., Ren L.Z., A Robust Watermarking Algorithm Based on DCT Region and Its Realization by Means of Matlab, Computer knowledge and technology, 9, pp. 813-814, (2007)
[8]  
Zhang R., A Novel Image Authentification Based on Semi-fragile Watermarking, Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, CSO, (2012)
[9]  
Roland K., Peter M., Andreas U., A lightweight Rao-Cauchy detector for additive watermarking in the DWT-Domain, International Multimedia Conference Proceedings of the 10th ACM workshop on Multimedia and security, (2008)