### Abstract

Generally, low frequency domain may be useful to embed a watermark in an image. However, if a watermark is embedded into low frequency components, blocking effects may occur in the image. Then considering blocking effects, we study some characteristics among DCT coeficients and find some interesting mutual relations. Here, the robustness of many schemes based on the orthogonal transformations such as DCT may be doubtful against geometric transformations. For the distortions produced by some geometric transformations, we propose a searching protocol to find the watermarked block which is rotated and shifted. In the proposed scheme, a watermark can remain in the attacked image with very high probability in our scheme. Further, the watermark becomes more robust than the above scheme using error-correction.

Original language | English |
---|---|

Title of host publication | Information Security - 3rd International Workshop, ISW 2000, Proceedings |

Publisher | Springer Verlag |

Volume | 1975 |

ISBN (Print) | 3540414169, 9783540414162 |

Publication status | Published - 2000 |

Externally published | Yes |

Event | 3rd International Workshop on Information Security, ISW 2000 - Wollongong, Australia Duration: Dec 20 2000 → Dec 21 2000 |

### Publication series

Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|

Volume | 1975 |

ISSN (Print) | 03029743 |

ISSN (Electronic) | 16113349 |

### Other

Other | 3rd International Workshop on Information Security, ISW 2000 |
---|---|

Country | Australia |

City | Wollongong |

Period | 12/20/00 → 12/21/00 |

### Fingerprint

### ASJC Scopus subject areas

- Computer Science(all)
- Theoretical Computer Science

### Cite this

*Information Security - 3rd International Workshop, ISW 2000, Proceedings*(Vol. 1975). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1975). Springer Verlag.

**A watermarking scheme based on the characteristic of addition among DCT coefficients.** / Kuribayashi, Minoru; Tanaka, Hatsukazu.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

*Information Security - 3rd International Workshop, ISW 2000, Proceedings.*vol. 1975, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1975, Springer Verlag, 3rd International Workshop on Information Security, ISW 2000, Wollongong, Australia, 12/20/00.

}

TY - GEN

T1 - A watermarking scheme based on the characteristic of addition among DCT coefficients

AU - Kuribayashi, Minoru

AU - Tanaka, Hatsukazu

PY - 2000

Y1 - 2000

N2 - Generally, low frequency domain may be useful to embed a watermark in an image. However, if a watermark is embedded into low frequency components, blocking effects may occur in the image. Then considering blocking effects, we study some characteristics among DCT coeficients and find some interesting mutual relations. Here, the robustness of many schemes based on the orthogonal transformations such as DCT may be doubtful against geometric transformations. For the distortions produced by some geometric transformations, we propose a searching protocol to find the watermarked block which is rotated and shifted. In the proposed scheme, a watermark can remain in the attacked image with very high probability in our scheme. Further, the watermark becomes more robust than the above scheme using error-correction.

AB - Generally, low frequency domain may be useful to embed a watermark in an image. However, if a watermark is embedded into low frequency components, blocking effects may occur in the image. Then considering blocking effects, we study some characteristics among DCT coeficients and find some interesting mutual relations. Here, the robustness of many schemes based on the orthogonal transformations such as DCT may be doubtful against geometric transformations. For the distortions produced by some geometric transformations, we propose a searching protocol to find the watermarked block which is rotated and shifted. In the proposed scheme, a watermark can remain in the attacked image with very high probability in our scheme. Further, the watermark becomes more robust than the above scheme using error-correction.

UR - http://www.scopus.com/inward/record.url?scp=23044522787&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=23044522787&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:23044522787

SN - 3540414169

SN - 9783540414162

VL - 1975

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

BT - Information Security - 3rd International Workshop, ISW 2000, Proceedings

PB - Springer Verlag

ER -