Browse > Article
http://dx.doi.org/10.6109/jicce.2011.9.2.212

Watermarking Based on Complemented MLCA and 2D CAT  

Li, Xiao-Wei (Department of Information & Communications Engineering, Pukyong National University)
Yun, Jae-Sik (Department of Information & Communications Engineering, Pukyong National University)
Cho, Sung-Jin (Dept. of Applied Mathematics, Pukyong National University)
Kim, Seok-Tae (Department of Information & Communications Engineering, Pukyong National University)
Abstract
Digital watermarking has gained importance in recent years in copyright protection and multimedia. This paper proposes a secure and novel watermarking system based on complemented Maximum Length Cellular Automata (MLCA) and Two-Dimension Cellular Automata Transform (2D CAT). In this watermarking scheme, the original watermark is first encrypted by complemented MLCA with the private keys, and then the encrypted watermark is embedded into the CAT domain of the cover image, at last use the inverse CAT for the transformed image, the watermarked image is obtained. Experiment results show that this new method is more secure and provides robust performance against watermarking attacks.
Keywords
watermarking; complemented MLCA; 2D CAT; private key;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S.T.Kim, Y.R.Piao, "Robust and Secure InIm-based 3D Watermarking Scheme using Cellular Automata Transform", IJMICS, pp.1767-1778, 2009.
2 B. Viher, A. Dobnikar and D. Zazula, "CA and Follicle Recognition problem and Possibilities of using CA for Image Recognition Purposes", International Journal of Medical Informatics, pp.231-241, 1998.
3 S. Nandi, B.KKar and P.P. Chaudhuri, "Theory and application of cellular automata", Proc.IEE, Stevenage, U.K., Vol.137, pp.81-87, Jan.1990.
4 S.J.Cho, U.S.Choi and Y.H.Hwangi, "Computing phase shifts of Maximum-Length 90/150 cellular automata sequences", lecture notes in computer science, pp.31-39, Oct.2004.
5 T.H. Nam, S.T. Kim and S.J. Cho, "image encryption using Nonlinear FSR and complemented MLCA", 2009 international conference of maritime information and communication science, Vol.2, No.1, pp.168-171, Jun.2009.
6 Olu Lafe, "Cellular Automata Transforms: Theory and Application in Multimedia Compression, Encryption, and Modeling", Kluwer Academic Publishers, Boston/Dordrecht/London, pp.581-591, 1997.
7 T.L.Booth, "Sequential Machines and Automata Theory", London, 1967.