Abstract
In this paper, we propose a new digital watermarking algorithm that hides specific information related to content-users. The proposed algorithm uses a correlation peak position modulation (CPPM) to ensure robustness and sufficient capacity, and this is modulated by user information. For a JPEG compression operation with a quality factor of 35, the other methods show a bit error rate of 2.45 % when two messages are embedded, but using CPPM this is reduced to 0 %, even with four messages. In case of a collusion attack, CPPM can detect up to 12 attackers, compared with a maximum of five attackers with position-based watermarking. Our experiments demonstrate that the proposed algorithm is a competitive method for image watermarking.
Similar content being viewed by others
References
Aikebaier A, Enokido T, Takizawa M (2011) “Trustworthy group making algorithm in distributed systems”, Human-centric Computing and. Inf Sci 1:6
Borges PVK, Mayer J (2004) “Informed Position based Watermarking”, IEEE Proceedings of the 17th Brazilian Symposium on Computer Graphics and Image Processing
Cox I, Kilian J, Leighton T, Shamoon T (1997) “Secure spread spectrum watermarking for multimedia”, IEEE Trans Image Process 6(12):1673–1687
R. Grobois and T. Ebrahimi, “Watermarking in JPEG 2000 domain,” Proceeding of the IEEE Workshop on Multimedia Signal Processing, 2001, pp. 3–5
J. L. Gonzalez and Ricardo Marcelnez, “Phoenix: Fault-Tolerant Distributed Web Storage based on URLs,” Journal of Convergence, Vol.2, No.1, 2012, pp. 79–86
Kim J, Kim N, Lee D, Park S, Lee S (2010) “Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents”, Signal Process Image Commun 25:559–576
Lee Y, Kim J (2011) “Robust blind watermarking scheme for digital images based on discrete fractional random transform”, Multimedia, Computer Graphics and Broadcasting Communications in Computer and Information Science 263 pp. 139–145
Li D, Kim J (2012) “Secure image forensic marking algorithm using 2D barcode and off-axis hologram in DWT-DFRNT domain”. A Math and Inf Sci 6(2S):513–520
Luo H, Shyu M-L (2011) “Quality of service provision in mobile multimedia - a survey”, Human-centric Computing and Information Sciences 1-15
Maity SP, Kundu MK (2011) “Perceptually adaptive spread transform image watermarking scheme using Hadamard transform”, J Inf Sci 181(3):450–465
S. P. Maity, M. K. Kundu and M.K. Mandal, “Capacity Improvement in Spread Spectrum Watermarking using Biorthogonal Wavelet,” Proc. 12th National Conference on Communication NCC 2006, pp. 114–118, 2006
S. P. Maity, P. K. Nandi and T. S. Das, “Robustness improvement in spread spectrum watermarking using M-ary modulation,” Proc. 11th National Conference on Communication NCC 2005, pp. 569–573, 2005
Nah J, Kim J (2012) “Analysis of correlation peak position modulation”, Lect Notes Elec Eng 203:159–167
Nah J, Kim JW, Kim J (2011) “Image watermarking for identification forgery prevention”, Journal of the Korea Contents Association
Nah J, Kim JW, Kim J (2013) “Video forensic marking algorithm using peak position modulation”, Journal of Applied Mathematics & Information Sciences (AMIS), 7(6):2391–2396
J. J. K. O. Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, Vol. 66 (III), pp. 303–317, May 1998
Wei Q, Qin T, Fujita S (2012) “A two-level caching protocol for hierarchical peer-to-peer file sharing systems”, J Converg 2(1):11–16
Acknowledgments
This research project was supported by the Ministry of Culture, Sports and Tourism (MCST) and Korea Copyright Commission in 2011.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Nah, J., Kim, J. Collusion attack-resistant watermarking scheme using correlation peak position modulation. Multimed Tools Appl 75, 14917–14926 (2016). https://doi.org/10.1007/s11042-014-2233-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2233-6