Oblivious Schemes of Ghost-based Watermarking for Dct Coefficients

نویسندگان

  • Hiromu KODA
  • Tomoyuki OGAWA
  • Shojiro SAKATA
چکیده

In this paper we present oblivious schemes of ghost-based watermarking for DCT coefficients and examine the fundamental resistance to some attacks. First we introduce a bipolar ghost model, which consists of a composite signal and its complementary signal, and formulate the power cepstrum for the model. Next we define the cepstral difference between the composite and complementary signals to improve the cepstral performance, and examine some properties of the cepstral difference. After that, we explain two types of oblivious algorithms for the ghost-based watermarking in DCT domain taking the above properties into account. The experimental results for some test images show that the watermark information in each image can be detected sensitively by our schemes even when the watermarked images are subjected to processing technique such as clipping.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Oblivious Image-Adaptive Watermarking Using Quantization Index Modulation

This paper proposes a new oblivious imageadaptive watermarking technique which utilizes a visual model in the discrete cosine transform (DCT) domain and is based on quantization index modulation. In this scheme, the image is watermarked by modifying selected DCT coefficients of image blocks under a constraint specified by the visual model. The binary watermark is recovered from the watermarked ...

متن کامل

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract In recent year, to protect digital content (text, images, audio, and video) from illegal manipulations that has been developed digital image watermarking techniques. In this paper we proposed two different watermarking schemes based on DCTDWT-SVD. ...

متن کامل

Collusion Attack Resistant Watermarking Scheme for Colored Images using DCT

Image watermarking with both insensible detection and high robustness capabilities is still a challenging problem for copyright protection up to now. This paper presents a new scheme for hiding a logo-based watermark in colored still image which is inherently collusion attack resistant. This scheme is based on averaging of middle frequency coefficients of block Discrete Cosine Transform (DCT) c...

متن کامل

A Synchronous Fragile Watermarking Scheme for Erroneous Q-DCT Coefficients Detection

In video communications over error introducing channels, error concealment techniques are widely applied in video decoder for good subjective images output. However, a damaged MB could be concealed only after it is detected as erroneous. Because of the poor performance of the traditional syntax based error detection schemes, the error concealments thereafter show bad results. Our previous work ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004