Skip to main content
Log in

Collusion attack-resistant watermarking scheme using correlation peak position modulation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose a new digital watermarking algorithm that hides specific information related to content-users. The proposed algorithm uses a correlation peak position modulation (CPPM) to ensure robustness and sufficient capacity, and this is modulated by user information. For a JPEG compression operation with a quality factor of 35, the other methods show a bit error rate of 2.45 % when two messages are embedded, but using CPPM this is reduced to 0 %, even with four messages. In case of a collusion attack, CPPM can detect up to 12 attackers, compared with a maximum of five attackers with position-based watermarking. Our experiments demonstrate that the proposed algorithm is a competitive method for image watermarking.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Aikebaier A, Enokido T, Takizawa M (2011) “Trustworthy group making algorithm in distributed systems”, Human-centric Computing and. Inf Sci 1:6

    Google Scholar 

  2. Borges PVK, Mayer J (2004) “Informed Position based Watermarking”, IEEE Proceedings of the 17th Brazilian Symposium on Computer Graphics and Image Processing

    Google Scholar 

  3. Cox I, Kilian J, Leighton T, Shamoon T (1997) “Secure spread spectrum watermarking for multimedia”, IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  4. R. Grobois and T. Ebrahimi, “Watermarking in JPEG 2000 domain,” Proceeding of the IEEE Workshop on Multimedia Signal Processing, 2001, pp. 3–5

  5. J. L. Gonzalez and Ricardo Marcelnez, “Phoenix: Fault-Tolerant Distributed Web Storage based on URLs,” Journal of Convergence, Vol.2, No.1, 2012, pp. 79–86

  6. Kim J, Kim N, Lee D, Park S, Lee S (2010) “Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents”, Signal Process Image Commun 25:559–576

    Article  Google Scholar 

  7. Lee Y, Kim J (2011)  “Robust blind watermarking scheme for digital images based on discrete fractional random transform”, Multimedia, Computer Graphics and Broadcasting Communications in Computer and Information Science  263 pp. 139–145

  8. Li D, Kim J (2012) “Secure image forensic marking algorithm using 2D barcode and off-axis hologram in DWT-DFRNT domain”. A Math and Inf Sci 6(2S):513–520

    Google Scholar 

  9. Luo H, Shyu M-L (2011) “Quality of service provision in mobile multimedia - a survey”, Human-centric Computing and Information Sciences 1-15

  10. Maity SP, Kundu MK (2011)  “Perceptually adaptive spread transform image watermarking scheme using Hadamard transform”, J Inf Sci 181(3):450–465

    Article  Google Scholar 

  11. S. P. Maity, M. K. Kundu and M.K. Mandal, “Capacity Improvement in Spread Spectrum Watermarking using Biorthogonal Wavelet,” Proc. 12th National Conference on Communication NCC 2006, pp. 114–118, 2006

  12. S. P. Maity, P. K. Nandi and T. S. Das, “Robustness improvement in spread spectrum watermarking using M-ary modulation,” Proc. 11th National Conference on Communication NCC 2005, pp. 569–573, 2005

  13. Nah J, Kim J (2012)  “Analysis of correlation peak position modulation”, Lect Notes Elec Eng 203:159–167

    Article  Google Scholar 

  14. Nah J, Kim JW, Kim J (2011) “Image watermarking for identification forgery prevention”, Journal of the Korea Contents Association

    Google Scholar 

  15. Nah J, Kim JW, Kim J (2013) “Video forensic marking algorithm using peak position modulation”, Journal of Applied Mathematics & Information Sciences (AMIS), 7(6):2391–2396 

  16. J. J. K. O. Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, Vol. 66 (III), pp. 303–317, May 1998

  17. Wei Q, Qin T, Fujita S (2012) “A two-level caching protocol for hierarchical peer-to-peer file sharing systems”, J Converg 2(1):11–16

    Google Scholar 

Download references

Acknowledgments

This research project was supported by the Ministry of Culture, Sports and Tourism (MCST) and Korea Copyright Commission in 2011.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jongweon Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nah, J., Kim, J. Collusion attack-resistant watermarking scheme using correlation peak position modulation. Multimed Tools Appl 75, 14917–14926 (2016). https://doi.org/10.1007/s11042-014-2233-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2233-6

Keywords

Navigation