Skip to main content
Log in

A DCT-based ownership identification method with gray-level and colorful signatures

  • Theoretical Advances
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose an ownership identification method based on discrete cosine transformation (DCT). The copyright owner can select a gray-level or colorful image to be an ownership statement, which is used as a claim to the ownership of his/her work. Unlike traditional watermarking schemes, the ownership statement is not embedded into the image to be protected. Instead, our method will construct an ownership share for the author according to the feature of the original image and the ownership statement. The feature map of the original image is composed of DC coefficients of different DCT blocks. When piracy happens, the author can show his ownership share to reveal the ownership statement to prove his/her copyright. Note that the size of the ownership statement is not restricted to being smaller than that of the host image. In addition, multiple ownership statements can be registered for a single image without destroying each other. The experimental results will show the robustness of our scheme against several common attacks. Finally, we will give some discussions and comparisons with other researchers’ study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Chang CC, Chuang JC (2002) An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognit Lett 23:931–941

    Article  MATH  MathSciNet  Google Scholar 

  2. Chang CC, Hsiao JY, Yeh JC (2002) A colour image copyright protection scheme based on visual cryptography and discrete cosine transform. Imaging Sci J 50:133–140

    Google Scholar 

  3. Chang CC, Hwang KF, Lin Y (2000) A proof of copyright ownership using moment-preserving. In: Proceedings of the 24th annual international computer software and application conference (COMPSAC 2000), Taipei, Taiwan, 25–28 October 2000, pp 198–203

  4. Hernández JR, Amado M, Pérez-González F (2000) DCT-domain watermarking techniques for still images: detector performance analysis and a structure. IEEE Trans Image Process 9(1):55–68

    Article  Google Scholar 

  5. Hwang RJ (2000) A digital image copyright protection scheme based on visual cryptography. Tamkang J Sci Eng 3(2):97–106

    MATH  Google Scholar 

  6. Lee CH, Lee YK (1999) An adaptive digital image watermarking technique for copyright protection. IEEE Trans Consum Electron 45:1005–1015

    Article  Google Scholar 

  7. PivaA, Barni M, Bartolini F, Cappellini V (1997) DCT-based watermark recovering without resorting to the uncorrupted original image. In: Proceedings of the IEEE Signal processing society 1997 international conference on image processing (ICIP’97), vol 1, Atlanta, USA, October 1997, pp 520–523

  8. Tao B, Dickinson B (1997) Adaptive watermarking in the DCT domain. In: Proceedings of the 1997 IEEE international conference on acoustics, speech, and signal processing (ICASSP’97), vol 4, Munich, Germany, 21–24 April, 1997, pp 2985–2988

  9. Wallance GK (1992) The JPEG still picture compression standard. IEEE Trans Consum Electron 38:18–34

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ching-Sheng Hsu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tu, SF., Hsu, CS. A DCT-based ownership identification method with gray-level and colorful signatures. Pattern Anal Applic 9, 229–242 (2006). https://doi.org/10.1007/s10044-006-0039-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-006-0039-5

Keywords

Navigation