In this paper, we propose a new watermarking method which spreads an ID pattern with specific sequences and embeds it throughout the spatial domain of an image. A set of the sequences is a key for extracting the ID pattern. As an ID pattern is spread throughout an image, we can extract the ID pattern from a part of the image, that is a clipped image. We can also confirm authenticity by extracting the same ID pattern from several parts of an image. The proposed method is robust to StirMark, which is a benchmark tool to test robustness of watermarked images, as well as disturbance by noise addition and common image processing operations such as edge-enhancement, brightness-contrast conversion, posterization, Gauss filtering, median filtering, gamma correction, JPEG compression and clipping.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Akira SHIOZAKI, Jiro TANIMOTO, Motoi IWATA, "A Digital Image Watermarking Scheme Withstanding Malicious Attacks" in IEICE TRANSACTIONS on Fundamentals,
vol. E83-A, no. 10, pp. 2015-2022, October 2000, doi: .
Abstract: In this paper, we propose a new watermarking method which spreads an ID pattern with specific sequences and embeds it throughout the spatial domain of an image. A set of the sequences is a key for extracting the ID pattern. As an ID pattern is spread throughout an image, we can extract the ID pattern from a part of the image, that is a clipped image. We can also confirm authenticity by extracting the same ID pattern from several parts of an image. The proposed method is robust to StirMark, which is a benchmark tool to test robustness of watermarked images, as well as disturbance by noise addition and common image processing operations such as edge-enhancement, brightness-contrast conversion, posterization, Gauss filtering, median filtering, gamma correction, JPEG compression and clipping.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e83-a_10_2015/_p
Copy
@ARTICLE{e83-a_10_2015,
author={Akira SHIOZAKI, Jiro TANIMOTO, Motoi IWATA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A Digital Image Watermarking Scheme Withstanding Malicious Attacks},
year={2000},
volume={E83-A},
number={10},
pages={2015-2022},
abstract={In this paper, we propose a new watermarking method which spreads an ID pattern with specific sequences and embeds it throughout the spatial domain of an image. A set of the sequences is a key for extracting the ID pattern. As an ID pattern is spread throughout an image, we can extract the ID pattern from a part of the image, that is a clipped image. We can also confirm authenticity by extracting the same ID pattern from several parts of an image. The proposed method is robust to StirMark, which is a benchmark tool to test robustness of watermarked images, as well as disturbance by noise addition and common image processing operations such as edge-enhancement, brightness-contrast conversion, posterization, Gauss filtering, median filtering, gamma correction, JPEG compression and clipping.},
keywords={},
doi={},
ISSN={},
month={October},}
Copy
TY - JOUR
TI - A Digital Image Watermarking Scheme Withstanding Malicious Attacks
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2015
EP - 2022
AU - Akira SHIOZAKI
AU - Jiro TANIMOTO
AU - Motoi IWATA
PY - 2000
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E83-A
IS - 10
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - October 2000
AB - In this paper, we propose a new watermarking method which spreads an ID pattern with specific sequences and embeds it throughout the spatial domain of an image. A set of the sequences is a key for extracting the ID pattern. As an ID pattern is spread throughout an image, we can extract the ID pattern from a part of the image, that is a clipped image. We can also confirm authenticity by extracting the same ID pattern from several parts of an image. The proposed method is robust to StirMark, which is a benchmark tool to test robustness of watermarked images, as well as disturbance by noise addition and common image processing operations such as edge-enhancement, brightness-contrast conversion, posterization, Gauss filtering, median filtering, gamma correction, JPEG compression and clipping.
ER -