TY - GEN
T1 - DCT-OFDM based watermarking scheme robust against clipping attack
AU - Hakka, Masaki
AU - Kuribayashi, Minoru
AU - Morii, Masakatu
PY - 2014/1/1
Y1 - 2014/1/1
N2 - Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In this paper, we propose a watermarking scheme robust against the JPEG compression and a clipping attack using the DCT-OFDM based watermarking method. Robustness against the JPEG compression can be achieved by embedding watermark information into the low-frequency components. We employ the QIM method to the DCT-OFDM modulated signal. By embedding a synchronization signal, we attempt to recover the synchronization loss from a clipped image. In a preliminary experiment, we can detect the embedded synchronization signal around a correct synchronization point because the synchronization signal is mainly embedded into the low-frequency components in a spread form. Then, we determine the center among the detected points as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.
AB - Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In this paper, we propose a watermarking scheme robust against the JPEG compression and a clipping attack using the DCT-OFDM based watermarking method. Robustness against the JPEG compression can be achieved by embedding watermark information into the low-frequency components. We employ the QIM method to the DCT-OFDM modulated signal. By embedding a synchronization signal, we attempt to recover the synchronization loss from a clipped image. In a preliminary experiment, we can detect the embedded synchronization signal around a correct synchronization point because the synchronization signal is mainly embedded into the low-frequency components in a spread form. Then, we determine the center among the detected points as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.
KW - clipping attack
KW - dct-ofdm
KW - jpeg compression
KW - qim
KW - synchronization signal
UR - http://www.scopus.com/inward/record.url?scp=84902830186&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84902830186&partnerID=8YFLogxK
U2 - 10.1145/2598908.2598914
DO - 10.1145/2598908.2598914
M3 - Conference contribution
AN - SCOPUS:84902830186
SN - 9781450328036
T3 - IWIHC 2014 - Proceedings of the 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, Co-located with ASIA CCS 2014
SP - 18
EP - 24
BT - IWIHC 2014 - Proceedings of the 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, Co-located with ASIA CCS 2014
PB - Association for Computing Machinery
T2 - 1st ACM International Workshop on Information Hiding and Its Criteria for Evaluation, IWIHC 2014
Y2 - 3 June 2014 through 3 June 2014
ER -