DCT-OFDM based watermarking scheme robust against clipping attack

Masaki Hakka, Minoru Kuribayashi, Masakatu Morii

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In this paper, we propose a watermarking scheme robust against the JPEG compression and a clipping attack using the DCT-OFDM based watermarking method. Robustness against the JPEG compression can be achieved by embedding watermark information into the low-frequency components. We employ the QIM method to the DCT-OFDM modulated signal. By embedding a synchronization signal, we attempt to recover the synchronization loss from a clipped image. In a preliminary experiment, we can detect the embedded synchronization signal around a correct synchronization point because the synchronization signal is mainly embedded into the low-frequency components in a spread form. Then, we determine the center among the detected points as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.

Original languageEnglish
Title of host publicationIWIHC 2014 - Proceedings of the 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, Co-located with ASIA CCS 2014
PublisherAssociation for Computing Machinery
Pages18-24
Number of pages7
ISBN (Print)9781450328036
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, IWIHC 2014 - Kyoto, Japan
Duration: Jun 3 2014Jun 3 2014

Other

Other1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, IWIHC 2014
CountryJapan
CityKyoto
Period6/3/146/3/14

Fingerprint

Watermarking
Orthogonal frequency division multiplexing
Synchronization
Digital watermarking
Image quality
Computer simulation
Experiments

Keywords

  • clipping attack
  • dct-ofdm
  • jpeg compression
  • qim
  • synchronization signal

ASJC Scopus subject areas

  • Information Systems

Cite this

Hakka, M., Kuribayashi, M., & Morii, M. (2014). DCT-OFDM based watermarking scheme robust against clipping attack. In IWIHC 2014 - Proceedings of the 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, Co-located with ASIA CCS 2014 (pp. 18-24). Association for Computing Machinery. https://doi.org/10.1145/2598908.2598914

DCT-OFDM based watermarking scheme robust against clipping attack. / Hakka, Masaki; Kuribayashi, Minoru; Morii, Masakatu.

IWIHC 2014 - Proceedings of the 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, Co-located with ASIA CCS 2014. Association for Computing Machinery, 2014. p. 18-24.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hakka, M, Kuribayashi, M & Morii, M 2014, DCT-OFDM based watermarking scheme robust against clipping attack. in IWIHC 2014 - Proceedings of the 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, Co-located with ASIA CCS 2014. Association for Computing Machinery, pp. 18-24, 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, IWIHC 2014, Kyoto, Japan, 6/3/14. https://doi.org/10.1145/2598908.2598914
Hakka M, Kuribayashi M, Morii M. DCT-OFDM based watermarking scheme robust against clipping attack. In IWIHC 2014 - Proceedings of the 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, Co-located with ASIA CCS 2014. Association for Computing Machinery. 2014. p. 18-24 https://doi.org/10.1145/2598908.2598914
Hakka, Masaki ; Kuribayashi, Minoru ; Morii, Masakatu. / DCT-OFDM based watermarking scheme robust against clipping attack. IWIHC 2014 - Proceedings of the 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, Co-located with ASIA CCS 2014. Association for Computing Machinery, 2014. pp. 18-24
@inproceedings{5dce98936d714e6b8b26a5e7f281d219,
title = "DCT-OFDM based watermarking scheme robust against clipping attack",
abstract = "Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In this paper, we propose a watermarking scheme robust against the JPEG compression and a clipping attack using the DCT-OFDM based watermarking method. Robustness against the JPEG compression can be achieved by embedding watermark information into the low-frequency components. We employ the QIM method to the DCT-OFDM modulated signal. By embedding a synchronization signal, we attempt to recover the synchronization loss from a clipped image. In a preliminary experiment, we can detect the embedded synchronization signal around a correct synchronization point because the synchronization signal is mainly embedded into the low-frequency components in a spread form. Then, we determine the center among the detected points as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.",
keywords = "clipping attack, dct-ofdm, jpeg compression, qim, synchronization signal",
author = "Masaki Hakka and Minoru Kuribayashi and Masakatu Morii",
year = "2014",
doi = "10.1145/2598908.2598914",
language = "English",
isbn = "9781450328036",
pages = "18--24",
booktitle = "IWIHC 2014 - Proceedings of the 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, Co-located with ASIA CCS 2014",
publisher = "Association for Computing Machinery",

}

TY - GEN

T1 - DCT-OFDM based watermarking scheme robust against clipping attack

AU - Hakka, Masaki

AU - Kuribayashi, Minoru

AU - Morii, Masakatu

PY - 2014

Y1 - 2014

N2 - Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In this paper, we propose a watermarking scheme robust against the JPEG compression and a clipping attack using the DCT-OFDM based watermarking method. Robustness against the JPEG compression can be achieved by embedding watermark information into the low-frequency components. We employ the QIM method to the DCT-OFDM modulated signal. By embedding a synchronization signal, we attempt to recover the synchronization loss from a clipped image. In a preliminary experiment, we can detect the embedded synchronization signal around a correct synchronization point because the synchronization signal is mainly embedded into the low-frequency components in a spread form. Then, we determine the center among the detected points as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.

AB - Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In this paper, we propose a watermarking scheme robust against the JPEG compression and a clipping attack using the DCT-OFDM based watermarking method. Robustness against the JPEG compression can be achieved by embedding watermark information into the low-frequency components. We employ the QIM method to the DCT-OFDM modulated signal. By embedding a synchronization signal, we attempt to recover the synchronization loss from a clipped image. In a preliminary experiment, we can detect the embedded synchronization signal around a correct synchronization point because the synchronization signal is mainly embedded into the low-frequency components in a spread form. Then, we determine the center among the detected points as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.

KW - clipping attack

KW - dct-ofdm

KW - jpeg compression

KW - qim

KW - synchronization signal

UR - http://www.scopus.com/inward/record.url?scp=84902830186&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84902830186&partnerID=8YFLogxK

U2 - 10.1145/2598908.2598914

DO - 10.1145/2598908.2598914

M3 - Conference contribution

SN - 9781450328036

SP - 18

EP - 24

BT - IWIHC 2014 - Proceedings of the 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, Co-located with ASIA CCS 2014

PB - Association for Computing Machinery

ER -