PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper proposes an effective digital watermarking scheme to protect the intellectual property rights of digital images. This scheme embeds representative watermarks into images during the process of side-match vector quantization (SMVQ) compresses and extracts the digital watermark effectively in order to determine the ownership of the image when a dispute over intellectual property rights occurs. The method proposed in this paper embeds a watermark based on the grouping of the codewords in a state codebook, and it stresses the fact that the SMVQ compressed image and the decompressed image both contain watermarks. In addition, the decompressed image has strong resistance against being damaged. Even under JPEG lossy compression, the watermark can still be restored effectively. The proposed method enables the watermark to be embedded directly into a compressed image that is much smaller than the original one. Once applied to the network, the method can save time in image transmission as well as storage space.
Wydawca
Rocznik
Strony
89--106
Opis fizyczny
Bibliogr. 16 poz., tab., wykr.
Twórcy
autor
  • Department of Information Management , National Taichung Institute of Technology, Taicfnmg City. Taiwan. 404, R. O. C.
autor
  • Department of Computer Science and Information Engineering, National Chung Cheng University
Bibliografia
  • [1] W. Bender, D. Gruhl, N. Morimoto, and A. Lu: Techniques for Data Hiding, IBM System Journal, 35(3), 1996,313-336.
  • [2] A. G. Bors and I. Pitas: Image Watermarking Using DCT Domain Constraint:, Proceedings IEEE International Conference on Image Processing (ICIP'96). 3. 1996, 231-234.
  • [3] C. C. Chang and C. S. Tsai: A Technique for Computing Watermarks from Digital Images, Journal of Computing and Informatica, Vol. 24, 2000, pp. 391 -396.
  • [4] C. C. Chang and H. C. Wu: A Copyright Protection Scheme of Images Based on Visual Cryptography, to appear in The Imaging Science Journal. 2002.
  • [5] I. J. Cox and J. P. M. G. Linnartz: Some General Methods for Tampering with Watermarks, IEEE Journal on Selected Areas in Communications, 16(4), 1998. 587-593.
  • [6] S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung: Resolving Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications, IEEE Journal on Selected Areas in Communications, 16(4), 1998,573-586.
  • [7] V. Darmstaedter, J. F. Delaigle, J. J., Quisquater and B. Macq: Low Cost Spatial Watermarking." Computer and Graphics, 22(4), 1998. 417-24.
  • [8] C. T. Hsu and J. L. Wu: Hidden Digital Watermarks in Images, IEEE Transactions on Image Processing, 8(1), 1999,58-68.
  • [9] T. Kim: Side Match and Overlap Match Vector Quantizers for Images. IEEE Transactions Image Processing, yol. 1, No. 7, April 1992,pp. 170-185.
  • [10] M. Kutter, F. Jordan, and F. Bossen: Digital Watermarking of Color Images Using Amplitude Modulation. Journal of Electronic Imaging, 7(2), 1998,326-332.
  • [11] Y. Linde. A., Buzo, and R. M. Gray: An Algorithm for Vector Quantization Design, IEEE Transactions on Communications. 28. Jan. 1980, 84-95.
  • [12] Z. M. Lu. J. S. Pan, and S. H. Sun: VQ-Based Digital Image Watermarking Method, IEE Electronic Letters, 36(14). 2000. 1201-1202.
  • [13] A. Makur and S. S. Selvi: Variable Dimension Vector Quantization Based Image Watermarking, Signal Processing, 81. 2001. 889-893.
  • [14] X. M. Niu, Z. M. Lu, and S, H. Sun: Digital Watermarking of Still Image with Gray-Level Digital Watermarks. IEEE Transactions on Consumer Electronic. 46(1). 2000. 137-145.
  • [15] M. D. Swason, M. Kobayashi, and A. H. Tewfik: Multimedia Data Embedding and Watermarking Technologies Proceedings of IEEE 86(6). 1998. 1064-1087.
  • [16] G. Voyatzis and I. Pitas: Protecting Digital-Image Copyrights: A Framework. IEEE Computer Graphics and Applications, 1, 1999, 18-24.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0005-0093
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.