Reversible Watermarking by Modulation and Security Enhancement

被引:33
作者
Wu, Hao-Tian [1 ]
Cheung, Yiu-Ming [2 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Hong Kong Baptist Univ, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
关键词
Authentication; modulation; reversible watermarking; security; 3-D geometry; DIGITAL WATERMARKING;
D O I
10.1109/TIM.2009.2022453
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a watermarking algorithm that is suitable for the data represented in floating- or fixed-point numbers. By keeping the modulation information, every value in the original object can be restored with the smallest error. For the sake of exact recovery, the redundancy in the watermarked object should be exploited to save the recovery information. We analyze the security of the algorithm and enhance it by adding a pseudorandom (PR) sequence to the watermarked object. The algorithm can be applied in the measurement to embed some useful information in a distortion-free way. We implement it on the Virtual Reality Modeling Language (VRML) models, and the experimental results show its efficacy.
引用
收藏
页码:221 / 228
页数:8
相关论文
共 29 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]  
[Anonymous], HIGH DYNAMIC RANGE I
[3]  
*ANSI IEEE, 1985, 7541985 ANSIIEEE
[4]  
BENEDENS O, 2000, P EUROGRAPHICS COMPU, V19, P199
[5]   An adaptive compressed MPEG-2 video watermarking scheme [J].
Biswas, S ;
Das, SR ;
Petriu, EM .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2005, 54 (05) :1853-1861
[6]   Speech quality evaluation: A new application of digital watermarking [J].
Cai, Libin ;
Tu, Ronghui ;
Zhao, Jiying ;
Mao, Yongyi .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2007, 56 (01) :45-55
[7]  
CAYRE F, 2004, RR5223 INRIA
[8]  
Celik MU, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P157
[9]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[10]   Sequential quantization strategy for data embedding and integrity verification [J].
Cheung, Yiu-ming ;
Wu, Hao-tian .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2007, 17 (08) :1007-1016