Skip to main content

DCT-OFDM Based Watermarking Scheme Robust Against Clipping, Rotation, and Scaling Attacks

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9569))

Included in the following conference series:

  • 1218 Accesses

Abstract

The digital watermark is used for copyright protection, and the methods should have the robustness against various attacks such as JPEG compression, clipping, rotation, and scaling attacks. Based on the DCT-OFDM based watermarking method presented at IWIHC2014, we propose a method enhancing the performance in this paper. There are two ideas in the proposed method. One idea is to reduce the computational costs required for the synchronization recovery. The other idea is to encode watermark information by error correcting code and to decode it by maximum likelihood algorithm. As the result, our method has high robustness against the IHC evaluation criteria with less degradation of quality and less computational costs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 98. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  2. Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Trans. Signal Process. 17(5), 58–64 (2000)

    Article  Google Scholar 

  3. IHC Committee. IHC Evaluation Criteria and Competition. http://www.ieice.org/iss/emm/ihc/IHC_criteriaVer4.pdf

  4. Hakka, M., Kuribayashi, M., Morii, M.: DCT-OFDM based watermarking scheme robust against clipping attack. In: Proceedings of IWIHC 2014, pp. 18–24 (2014)

    Google Scholar 

  5. Cox, I., Kilian, J., Leighton, F., Shamson, T.: Secure spreadspectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  6. Malvar, H.S., Florêncio, D.A.F.: Improved spreadspectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51(4), 898–905 (2003)

    Article  MathSciNet  Google Scholar 

  7. Maximal, R.G.: Recursive sequences with 3-valued recursivecross-correlation functions. IEEE Trans. Inf. Theor. 14(3), 154–156 (1968)

    Google Scholar 

  8. Viterbi, A.J.: Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Trans. Inf. Theor. 13(2), 260–269 (1967)

    Article  MATH  Google Scholar 

  9. Siozaki, A.: Basis of Information and Coding Theory. Ohmsha, Ltd. (2011)

    Google Scholar 

  10. Gallager, R.G.: Low Density Parity Check Codes. M.I.T. Press, Cambridge (1963)

    MATH  Google Scholar 

  11. Hirata, N., Kawamura, M.: Digital watermarking method using LDPC code for clipped image. In: Proceedings of IWIHC 2014, pp. 25–30. ACM (2014)

    Google Scholar 

  12. Chen, B., Wornell, G.W.: Quantization index modulation: aclass of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theor. 47(4), 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hiroaki Ogawa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Ogawa, H., Kuribayashi, M., Iwata, M., Kise, K. (2016). DCT-OFDM Based Watermarking Scheme Robust Against Clipping, Rotation, and Scaling Attacks. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31960-5_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31959-9

  • Online ISBN: 978-3-319-31960-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics