|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
A Digital Image Watermarking Scheme Withstanding Malicious Attacks
Akira SHIOZAKI Jiro TANIMOTO Motoi IWATA
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E83-A
No.10
pp.2015-2022 Publication Date: 2000/10/25 Online ISSN:
DOI: Print ISSN: 0916-8508 Type of Manuscript: PAPER Category: Information Security Keyword: watermark, copyright protection, digital images, ID information, StirMark,
Full Text: PDF(7.1MB)>>
Summary:
In this paper, we propose a new watermarking method which spreads an ID pattern with specific sequences and embeds it throughout the spatial domain of an image. A set of the sequences is a key for extracting the ID pattern. As an ID pattern is spread throughout an image, we can extract the ID pattern from a part of the image, that is a clipped image. We can also confirm authenticity by extracting the same ID pattern from several parts of an image. The proposed method is robust to StirMark, which is a benchmark tool to test robustness of watermarked images, as well as disturbance by noise addition and common image processing operations such as edge-enhancement, brightness-contrast conversion, posterization, Gauss filtering, median filtering, gamma correction, JPEG compression and clipping.
|
|