For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
A Digital Image Watermarking Scheme Withstanding Malicious Attacks
Akira SHIOZAKI Jiro TANIMOTO Motoi IWATA
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/10/25
Print ISSN: 0916-8508
Type of Manuscript: PAPER
Category: Information Security
watermark, copyright protection, digital images, ID information, StirMark,
Full Text: PDF(7.1MB)>>
In this paper, we propose a new watermarking method which spreads an ID pattern with specific sequences and embeds it throughout the spatial domain of an image. A set of the sequences is a key for extracting the ID pattern. As an ID pattern is spread throughout an image, we can extract the ID pattern from a part of the image, that is a clipped image. We can also confirm authenticity by extracting the same ID pattern from several parts of an image. The proposed method is robust to StirMark, which is a benchmark tool to test robustness of watermarked images, as well as disturbance by noise addition and common image processing operations such as edge-enhancement, brightness-contrast conversion, posterization, Gauss filtering, median filtering, gamma correction, JPEG compression and clipping.