A certificate-based watermarking scheme for coloured images

被引:4
作者
Wu, N. -I. [2 ]
Wang, C. -M. [2 ]
Tsai, C. -S. [1 ]
Hwang, M. -S. [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Natl Chung Hsing Univ, Inst Comp Sci & Engn, Taichung 402, Taiwan
关键词
copyright protection; watermarking; PRivate key; robustness;
D O I
10.1179/174313108X299516
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
In recent years, much of the research energy within the field of digital watermarking has been focused on techniques that depend on a third party, called the Image Certification Authority, to enhance the digital image copyright protection. However, to record the embedding locations of the watermark bits, in the design of most of these schemes, a secret key has to be generated after embedding one watermark into the cover image. As a result, there wind up to be quite some bunches of secret keys for the user to keep if large numbers of watermarked images are involved, which of course means a lot of inconvenience. In this paper, the authors propose a novel watermarking method to solve this problem. Also depending on the Image Certification Authority for copyright protection, the authors' new method makes a difference by providing the user with the power to process masses of digital image watermarking tasks using just one private key. The results of the authors' extensive experiments have proven both the capability of the proposed technique as an efficient management mechanism and the robustness of it against various image processing attacks such as Joint Photographic Experts Group compression, low pass filtering and high pass filtering as well as noise contamination.
引用
收藏
页码:326 / 332
页数:7
相关论文
共 22 条
[1]   A feature-oriented copyright owner proving technique for still images [J].
Chang, CC ;
Hwang, KF ;
Hwang, MS .
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2002, 12 (03) :317-330
[2]   Robust authentication scheme for protecting copyrights of images and graphics [J].
Chang, CC ;
Hwang, KF ;
Hwang, MS .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (01) :43-50
[3]   Mean quantization based image watermarking [J].
Chen, LH ;
Lin, JJ .
IMAGE AND VISION COMPUTING, 2003, 21 (08) :717-727
[4]   A publicly verifiable copyright-proving scheme resistant to malicious attacks [J].
Chen, TH ;
Horng, GB ;
Lee, WB .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2005, 52 (01) :327-334
[5]   DCT-based image watermarking using subsampling [J].
Chu, WC .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (01) :34-38
[6]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[7]   Cryptanalysis of Chu's DCT based watermarking scheme [J].
Das, Tanmoy Kanti ;
Maitra, Subhamoy ;
Zhou, Jianying .
IEEE TRANSACTIONS ON MULTIMEDIA, 2006, 8 (03) :629-632
[8]   Cryptanalysis of correlation-based watermarking schemes using single watermarked copy [J].
Das, TK ;
Maitra, S .
IEEE SIGNAL PROCESSING LETTERS, 2004, 11 (04) :446-449
[9]  
FENG JB, 2006, INT J NETWORK SECURI, P161
[10]   Multiple image watermarking applied to health information management [J].
Giakoumaki, Aggeliki ;
Pavlopoulos, Sotiris ;
Koutsouris, Dimitris .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2006, 10 (04) :722-732