PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

An improved self-embedding algorithm: robust protection against lossy compression attacks in digital image watermarking

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Watermarking is the process of embedding watermarks into an image such that the embedded watermark can be extracted later. Lossy compression attacks in digital water-marking are one of the major issues in digital watermarking. Cheddad et al. proposed a robust secured self-embedding method which is resistant to a certain amount of JPEG compression. Our experimental results show that the self-embedding method is resistant to JPEG compression attacks and not resistant to other lossy compression attacks such as Block Truncation Coding (ETC) and Singular Value Decomposition (SVD). Therefore we improved Cheddad et al's. method to give better protection against ETC and SVD compression attacks.
Słowa kluczowe
Twórcy
autor
autor
autor
autor
autor
  • School of Computing and Intelligent Systems, University of Ulster, UK
Bibliografia
  • [1] G. Voyatzis, I. Pitas. Protecting Digital-image copyrights: a framework. IEEE. Computer Graphics and Applications. 19:18-24, 1999.
  • [2] W. Bender, D. Gruhl, N. Morimoto,A. Lu. Techniques for data hiding. IBM Systems Journal. 35(3&4):313-336, 1996.
  • [3] I. J. Cox, J. Killian, T. Leighton, T. Shammon. Secure spread spectrum for multimedia. IEEE Transactions on Image Processing. 6(12): 1673-1687, 1997.
  • [4] M. Vetterli, J. Kovacevic. Wavelet and Subband Coding. Prentice-Hall, Englewood Cliffs, 1995.
  • 15] R. B. Wolfgang, C. I. Podichuk, E. J. Delp. Perceptual watermarks for digital images and video. Proceedings of the IEEE, 87(7): 1108-1126, 1999.
  • [6] A. Cheddad, J. Condell, K. Curran, P. McKevitt. A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing 89(12):2324-2332, 2009.
  • [7] Y. Pratheepan, J. V. Condell, K. Curran, A. Cheddad, P. Me Kevitt. An Improved Self-Embedding Algorithm: Digital Content Protection against Compression Attacks in Digital Watermarking, In: R. S. Choras (Ed.): Image Processing and Communication Challenges 2, Advances in Soft Computing, 84:59-66, Springer, 2010.
  • [8] H. Daren, L. Jiufen, H. Jiwu, L. Hongmei. A DWT-based image watermarking algorithm. IEEE Int Conf Multimedia and Expo. 429-432, 2001.
  • [9] S. Joo, Y. Suh, J. Shin, H. Kitkuchi. A New Robust Watermark Embedding into Wavelet DC Components. ETRI Journal. 24(5):401-404, 2002.
  • [10] R. W. Floyd, L. Steinberg. An adaptive algorithm for spatial grayscale. Proc. Soc. Inf. Disp. 12:55-77, 1976.
  • [11] R. Neelamani, R. Nowak, R. G. Baraniuk. WInHD: wavelet-based inverse halftoning viadeconvolution. submitted to IEEE Trans. Image Process, for publication, 2002.
  • [12] B. Chanda, D. Dutta Majumder. Digital Image Processing and Analysis. Prentice-Hall, 2000.
  • [13] D. Richards, A. Abrahamsen. Image compression using singular value decomposition, linear algebra applications, 2001.
  • [14] H. S. Prasantha, H. L. Shashidhara, K. N. Balasubramanya Murthy. Image Compression using SVD. Proc. of International Conference on Computational Intelligence and Multimedia Applications. 143-145, 2007.
  • [15] A. Cheddad, J. Condell, K. Curran, P. McKevitt. A Hash-based Image Encryption Algorithm. Opt. Comm. Elsevier Science. 283(6):879-893, 2010.
  • [16] Y. Wang, X. Liao, D. Xiao, K. Wong. Oneway hash function construction based on 2D coupled map lattices. Inf. Sci. 178(5): 1391-1406, 2008.
  • [17] US Secure Hash Algorithm 1. http://www.faqs.org/rfcs/rfc3174, 2001.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT5-0057-0007
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.