A Simplified and Robust DCT-based Watermarking Algorithm

被引:2
作者
Li, Xin [1 ]
Wang, Xingjun [1 ]
Chen, Anqi [1 ]
Xiao, Linghao [1 ]
机构
[1] Tsinghua Univ, Grad Sch Shenzhen, Dept Elect Engn, Shenzhen, Peoples R China
来源
2017 2ND INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP) | 2017年
关键词
digital watermarking; discrete cosine transform; information hiding; copyright protection;
D O I
10.1109/ICMIP.2017.18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Invisible digital watermarking is coming to be the most popular technology to protect digital copyright of multimedia data. Schemes based on Discrete Cosine Transform (DCT) are widely used in image or video digital watermarking. In this paper, we proposed a new method that simplify the previous DCT-based methods while more robust to common attacks than conventional methods. We get rid of traditional restrict of DCT-based methods that the blocks' sizes conducted DCT transform is 8*8, we divide the carrier image according to watermark image size, and the block size M*N varies due to the carrier image and watermark image. This change made our method more flexible that carrier image and watermark image size no longer need to satisfy restrict to get the 8*8 DCT transform blocks. This also made us can resist the image zoom in, zoom out and height-width ratio change attack. In previous DCT-based methods, watermark extraction is an inverse process of watermark embedding, which need to conduct DCT transform and we simplified the watermark extraction process just subtract the watermarked image with original image to get the watermark. The experiment results show that our method is robust to kinds of common piracy attacks.
引用
收藏
页码:167 / 171
页数:5
相关论文
共 12 条
[1]  
A Kurappa, 2016, SURVEY VARIOUS IMAGE
[2]  
Al-Haj Ali, 2007, Journal of Computer Sciences, V3, P740, DOI 10.3844/jcssp.2007.740.746
[3]  
Amirgholipour SK., 2009, JDCTA, V3, P42, DOI DOI 10.4156/JDCTA.VOL3.ISSUE2.AMIRGHOLIPOUR
[4]  
CHEN LW, 2008, IEEE T, P6822
[5]  
G Zhu, 2008, TECHNICAL WRITERS HD, V45, P38
[6]   A Video Watermarking Technique Based on Pseudo-3-D DCT and Quantization Index Modulation [J].
Huang, Hui-Yu ;
Yang, Cheng-Han ;
Hsu, Wen-Hsing .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :625-637
[7]  
J Abraham, 2016, INT J SIGNAL PROCESS, V9, P137
[8]  
MEI JS, 2009, P 2009 INT S WEB INF, P104
[9]   Region based QIM digital watermarking scheme for image database in DCT domain [J].
Phadikar, Amit ;
Maity, Santi P. ;
Verma, Bhupendra .
COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (03) :339-355
[10]  
Piva A, 1997, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL I, P520, DOI 10.1109/ICIP.1997.647964