Reversible watermarking scheme with image-independent embedding capacity

被引:16
作者
Li, CT [1 ]
机构
[1] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
来源
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING | 2005年 / 152卷 / 06期
关键词
D O I
10.1049/ip-vis:20045041
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Permanent distortion is one of the main drawbacks of all the irreversible watermarking schemes. Attempts to recover the original signal after the signal passing the authentication process are being made starting just a few years ago. Some common problems, such as salt-and-pepper artefacts owing to intensity wraparound and low embedding capacity, can now be resolved. However, some significant problems remain unsolved. First, the embedding capacity is signal-dependent, i.e., capacity varies significantly depending on the nature of the host signal. The direct impact of this is compromised security for signals with low capacity. Some signals may be even non-embeddable. Secondly, while seriously tackled in irreversible watermarking schemes, the well-known problem of block-wise dependence, which opens a security gap for the vector quantisation attack and transplantation attack, are not addressed by researchers of the reversible schemes. This work proposes a reversible watermarking scheme with near-constant signal-independent embedding capacity and immunity to the vector quantisation attack and transplantation attack.
引用
收藏
页码:779 / 786
页数:8
相关论文
共 17 条
[1]  
Alattar AM, 2003, IEEE IMAGE PROC, P501
[2]   Toward secure public-key blockwise fragile authentication watermarking [J].
Barreto, PSLM ;
Kim, HY ;
Rijmen, V .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02) :57-62
[3]  
Barton J. M., 1997, United States Patent, Patent No. [5646997, US5646997A]
[4]  
Celik MU, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P157
[5]  
Cox I. J., 2002, DIGITAL WATERMARKING
[6]   Circular interpretation of bijective transformations in lossless watermarking for media asset management [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (01) :97-105
[7]   Cryptanalysis of the Yeung-Mintzer fragile watermarking technique [J].
Fridrich, J ;
Goljan, M ;
Memon, N .
JOURNAL OF ELECTRONIC IMAGING, 2002, 11 (02) :262-274
[8]  
Goljan M., 2001, 4th Information Hiding Workshop, LNCS, V2137, P27, DOI DOI 10.1007/3-540-45496-9
[9]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[10]  
Honsinger C. W., 2001, 6 278 79, Patent No. [6278791, 6,278,791]