Browse > Article
http://dx.doi.org/10.9708/jksci.2019.24.02.041

An Iterative CRT Based Image Watermarking on DCT Domain  

Choi, Ji-Su (Dept. of Convergence Software, Soongsil University)
Kim, Gye-Young (Dept. of Software, Soongsil University)
Abstract
Digital image watermarking techniques have been studied in various fields in order to protect the copyright of multimedia contents mostly composed by images. JPEG compression is a representative copyright attack for image watermarking. The CRT-based watermarking methods in DCT domain have been studied, because these are robust for JPEG compression attack. In this paper, we propose a new method with improved performance compared with the existing CRT based methods in DCT domain. The proposed method selects the DCT block according to the denseness at the watermark insertion phase, and iteratively adjust the CRT Conditional coefficients at the watermark extraction. This paper shows that it is more robust for the JPEG compression attacks through experimental results.
Keywords
Digital image watermarking; Chinese Reminder Theorem(CRT); Discrete Cosine Transform (DCT); JPEG compression; Image Authentication; Copyright Protection;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G, "Secure and robust fragile watermarking scheme for medical images", IEEE Access 6:10269-10278, 2018.   DOI
2 M.-K. Kim, S. Lee, and G.-Y. Kim, "Fake Iris Image Detection based on Watermark," Journal of the Korea Society of Computer and Information vol. 23, no. 4, pp. 33-39, Apr. 2018.   DOI
3 W. Stallings, Cryptography and Network Security, Fifth Edition, Pearson Education Inc., 2011.
4 Gongsoo Jang, Hongjin Lee, Jooseung Yun and Yongsoo Park, "The Trend of Digital / Software Watermarking Technology for Digital Management," Proceedings of The KISS Conferences, Vol. 35, No. 1D, pp. 10-14, Jun, 2008.
5 I. J. Cox, M. L. Miller and J. A. Bloom, Digital Watermarking, Academic Press, San Diego, 2002
6 V. M. Potdar, S. Han and E. Chang, "A survey of digital image watermarking techniques", IEEE Intl. Conf. Industrial Informatics, Perth, Australia, Aug.2005, pp.709-716.
7 C-T. Hsu and J-L. Wu, "Hidden digital watermarks in images", IEEE Trans. Image Processing, vol. 8, no. 1, pp.58-68, Jan. 1999   DOI
8 P. Meerwald and A. Uhl, "Survey of wavelet-domain watermarking algorithms", Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 505-516, 2001
9 I. J. Cox, J. Killian, F. T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec 1997.   DOI
10 Shinfeng D. Lin, Shih-Chieh Shie, Jian-Yi Guo, "Improving the robustness of DCT-based image watermarking against JPEG compression", International Conference on Consumer Electronics, pp. 343-344, 8-12 Jan., 2005.
11 A. A. Mohammad, A. Alhaj and S. Shaltaf, "An improved SVD-based watermarking scheme for protecting rightful ownership", Signal Processing, vol. 88, pp. 2158-2180, 2008   DOI
12 J. C. Patra, J. E. Phua and C. Bornand, "A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression", Digital Signal Processing, vol. 20, no. 6, pp. 1597-1611, Mar. 2010   DOI
13 Ali, M., Ahn, C. W., Pant, M., Siarry, P, "An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony", Information Sciences, 301, 44-60, 2015.   DOI
14 Sung-Ho Bae, "Improved CRT-based Image Watermak ing in DCT Domain for Copyright Protection," Journal of Korea Multimedia Society, Vol. 16, No. 10, pp. 1163-1170, Oct, 2013.   DOI
15 J. C. Patra, A. Karthik and C. Bornand, "A Novel CRT-based watermarking technique for authentication of multimedia contents," Digital Signal Processing, vol. 20, no. 2, pp. 442-453, July 2009   DOI
16 Patra, Jagdish C., A. K. Kishore, and Cedric Bornand. "Improved CRT-based DCT domain watermarking technique with robustness against JPEG compression for digital media authentication." In Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, pp. 2940-2945.
17 J. C. Patra, J. E. Phua and D. Rajan, "DCT Domain watermarking scheme using Chinese Remainder Theorem for image authentication", in Proc. IEEE Intl. Conf. Multimedia and Expo (ICME 2010), Singapore, July 2010, pp. 111-116.
18 U. Sudibyo, F. Eranisa, E. H. Rachmawanto, D. R. I. M. Setiadi, and C. A. Sari, "A Secure Image Watermarking using Chinese Remainder Theorem Based on Haar Wavelet Transform," 2017 4th Int. Conf. Inf. Technol. Comput. Electr. Eng., pp. 208-212, 2017.
19 Hwai-Tsu HU, Hsu L-Y, "Exploring dwt-svd-dct feature parameters for robust multiple watermarking against jpeg and jpeg2000 compression". Comput Electr Eng 41:52-63, 2015.   DOI