Paper
29 April 2002 Robust image watermarking scheme resilient to desynchronization attacks
Changryoul Choi, Jechang Jeong
Author Affiliations +
Proceedings Volume 4675, Security and Watermarking of Multimedia Contents IV; (2002) https://doi.org/10.1117/12.465290
Event: Electronic Imaging, 2002, San Jose, California, United States
Abstract
Desynchronization attacks have been a particularly serious threat to watermarking applications. Therefore, there has been a concerted effort to solve this problem. It was Martin Kutter who first proposed to use watermark itself as a tool for estimating the affine transform parameters by its periodicity, what is called the self-reference scheme. His brilliant idea has led to many variations. This scheme is resistant to general geometric transform attacks and the 'reference' is more difficult to destroy than templates. However, this scheme has some drawbacks such as relatively low capacity and high computational complexity, especially in calculating the autocorrelation function. In this paper, we propose a robust watermarking scheme particularly resilient to desynchronization attacks by embedding the watermark periodically. We solve these two problems of the self-reference scheme. For the problem of low channel capacity, we propose to use a finite field sequence to partition a given block and M-ary modulation. For the other problem of high computational complexity, we introduce bit-wise computations in calculating the autocorrelation function. Also, we separate the estimation of a translation factor and affine transform factors, respectively, which results in performance improvement.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Changryoul Choi and Jechang Jeong "Robust image watermarking scheme resilient to desynchronization attacks", Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, (29 April 2002); https://doi.org/10.1117/12.465290
Lens.org Logo
CITATIONS
Cited by 4 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Image restoration

Image processing

Modulation

Sensors

Forward error correction

Image compression

RELATED CONTENT

Lossless data embedding for all image formats
Proceedings of SPIE (April 29 2002)
Source and channel coding approach to data hiding
Proceedings of SPIE (May 30 2000)

Back to Top