More secure lossless visible watermarking by DCT
Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. Aft...
Ausführliche Beschreibung
Autor*in: |
Lin, Yih-Kai [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2017 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science+Business Media New York 2017 |
---|
Übergeordnetes Werk: |
Enthalten in: Multimedia tools and applications - Springer US, 1995, 77(2017), 7 vom: 05. Mai, Seite 8579-8601 |
---|---|
Übergeordnetes Werk: |
volume:77 ; year:2017 ; number:7 ; day:05 ; month:05 ; pages:8579-8601 |
Links: |
---|
DOI / URN: |
10.1007/s11042-017-4753-3 |
---|
Katalog-ID: |
OLC2035045592 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2035045592 | ||
003 | DE-627 | ||
005 | 20230503193450.0 | ||
007 | tu | ||
008 | 200819s2017 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11042-017-4753-3 |2 doi | |
035 | |a (DE-627)OLC2035045592 | ||
035 | |a (DE-He213)s11042-017-4753-3-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 070 |a 004 |q VZ |
100 | 1 | |a Lin, Yih-Kai |e verfasserin |4 aut | |
245 | 1 | 0 | |a More secure lossless visible watermarking by DCT |
264 | 1 | |c 2017 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media New York 2017 | ||
520 | |a Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility. | ||
650 | 4 | |a DCT | |
650 | 4 | |a Watermarking | |
650 | 4 | |a Lossless | |
650 | 4 | |a Integer mapping | |
700 | 1 | |a Yang, Cheng-Hsing |4 aut | |
700 | 1 | |a Tsai, Jinn-Tsong |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Multimedia tools and applications |d Springer US, 1995 |g 77(2017), 7 vom: 05. Mai, Seite 8579-8601 |w (DE-627)189064145 |w (DE-600)1287642-2 |w (DE-576)052842126 |x 1380-7501 |7 nnns |
773 | 1 | 8 | |g volume:77 |g year:2017 |g number:7 |g day:05 |g month:05 |g pages:8579-8601 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11042-017-4753-3 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OLC-BUB | ||
912 | |a SSG-OLC-MKW | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |d 77 |j 2017 |e 7 |b 05 |c 05 |h 8579-8601 |
author_variant |
y k l ykl c h y chy j t t jtt |
---|---|
matchkey_str |
article:13807501:2017----::oeeueosesiilwtr |
hierarchy_sort_str |
2017 |
publishDate |
2017 |
allfields |
10.1007/s11042-017-4753-3 doi (DE-627)OLC2035045592 (DE-He213)s11042-017-4753-3-p DE-627 ger DE-627 rakwb eng 070 004 VZ Lin, Yih-Kai verfasserin aut More secure lossless visible watermarking by DCT 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2017 Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility. DCT Watermarking Lossless Integer mapping Yang, Cheng-Hsing aut Tsai, Jinn-Tsong aut Enthalten in Multimedia tools and applications Springer US, 1995 77(2017), 7 vom: 05. Mai, Seite 8579-8601 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:77 year:2017 number:7 day:05 month:05 pages:8579-8601 https://doi.org/10.1007/s11042-017-4753-3 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 77 2017 7 05 05 8579-8601 |
spelling |
10.1007/s11042-017-4753-3 doi (DE-627)OLC2035045592 (DE-He213)s11042-017-4753-3-p DE-627 ger DE-627 rakwb eng 070 004 VZ Lin, Yih-Kai verfasserin aut More secure lossless visible watermarking by DCT 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2017 Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility. DCT Watermarking Lossless Integer mapping Yang, Cheng-Hsing aut Tsai, Jinn-Tsong aut Enthalten in Multimedia tools and applications Springer US, 1995 77(2017), 7 vom: 05. Mai, Seite 8579-8601 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:77 year:2017 number:7 day:05 month:05 pages:8579-8601 https://doi.org/10.1007/s11042-017-4753-3 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 77 2017 7 05 05 8579-8601 |
allfields_unstemmed |
10.1007/s11042-017-4753-3 doi (DE-627)OLC2035045592 (DE-He213)s11042-017-4753-3-p DE-627 ger DE-627 rakwb eng 070 004 VZ Lin, Yih-Kai verfasserin aut More secure lossless visible watermarking by DCT 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2017 Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility. DCT Watermarking Lossless Integer mapping Yang, Cheng-Hsing aut Tsai, Jinn-Tsong aut Enthalten in Multimedia tools and applications Springer US, 1995 77(2017), 7 vom: 05. Mai, Seite 8579-8601 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:77 year:2017 number:7 day:05 month:05 pages:8579-8601 https://doi.org/10.1007/s11042-017-4753-3 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 77 2017 7 05 05 8579-8601 |
allfieldsGer |
10.1007/s11042-017-4753-3 doi (DE-627)OLC2035045592 (DE-He213)s11042-017-4753-3-p DE-627 ger DE-627 rakwb eng 070 004 VZ Lin, Yih-Kai verfasserin aut More secure lossless visible watermarking by DCT 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2017 Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility. DCT Watermarking Lossless Integer mapping Yang, Cheng-Hsing aut Tsai, Jinn-Tsong aut Enthalten in Multimedia tools and applications Springer US, 1995 77(2017), 7 vom: 05. Mai, Seite 8579-8601 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:77 year:2017 number:7 day:05 month:05 pages:8579-8601 https://doi.org/10.1007/s11042-017-4753-3 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 77 2017 7 05 05 8579-8601 |
allfieldsSound |
10.1007/s11042-017-4753-3 doi (DE-627)OLC2035045592 (DE-He213)s11042-017-4753-3-p DE-627 ger DE-627 rakwb eng 070 004 VZ Lin, Yih-Kai verfasserin aut More secure lossless visible watermarking by DCT 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2017 Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility. DCT Watermarking Lossless Integer mapping Yang, Cheng-Hsing aut Tsai, Jinn-Tsong aut Enthalten in Multimedia tools and applications Springer US, 1995 77(2017), 7 vom: 05. Mai, Seite 8579-8601 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:77 year:2017 number:7 day:05 month:05 pages:8579-8601 https://doi.org/10.1007/s11042-017-4753-3 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 77 2017 7 05 05 8579-8601 |
language |
English |
source |
Enthalten in Multimedia tools and applications 77(2017), 7 vom: 05. Mai, Seite 8579-8601 volume:77 year:2017 number:7 day:05 month:05 pages:8579-8601 |
sourceStr |
Enthalten in Multimedia tools and applications 77(2017), 7 vom: 05. Mai, Seite 8579-8601 volume:77 year:2017 number:7 day:05 month:05 pages:8579-8601 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
DCT Watermarking Lossless Integer mapping |
dewey-raw |
070 |
isfreeaccess_bool |
false |
container_title |
Multimedia tools and applications |
authorswithroles_txt_mv |
Lin, Yih-Kai @@aut@@ Yang, Cheng-Hsing @@aut@@ Tsai, Jinn-Tsong @@aut@@ |
publishDateDaySort_date |
2017-05-05T00:00:00Z |
hierarchy_top_id |
189064145 |
dewey-sort |
270 |
id |
OLC2035045592 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035045592</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503193450.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-017-4753-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035045592</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-017-4753-3-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lin, Yih-Kai</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">More secure lossless visible watermarking by DCT</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2017</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">DCT</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Watermarking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Lossless</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Integer mapping</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Cheng-Hsing</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsai, Jinn-Tsong</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">77(2017), 7 vom: 05. Mai, Seite 8579-8601</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:77</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:7</subfield><subfield code="g">day:05</subfield><subfield code="g">month:05</subfield><subfield code="g">pages:8579-8601</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-017-4753-3</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">77</subfield><subfield code="j">2017</subfield><subfield code="e">7</subfield><subfield code="b">05</subfield><subfield code="c">05</subfield><subfield code="h">8579-8601</subfield></datafield></record></collection>
|
author |
Lin, Yih-Kai |
spellingShingle |
Lin, Yih-Kai ddc 070 misc DCT misc Watermarking misc Lossless misc Integer mapping More secure lossless visible watermarking by DCT |
authorStr |
Lin, Yih-Kai |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)189064145 |
format |
Article |
dewey-ones |
070 - News media, journalism & publishing 004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1380-7501 |
topic_title |
070 004 VZ More secure lossless visible watermarking by DCT DCT Watermarking Lossless Integer mapping |
topic |
ddc 070 misc DCT misc Watermarking misc Lossless misc Integer mapping |
topic_unstemmed |
ddc 070 misc DCT misc Watermarking misc Lossless misc Integer mapping |
topic_browse |
ddc 070 misc DCT misc Watermarking misc Lossless misc Integer mapping |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Multimedia tools and applications |
hierarchy_parent_id |
189064145 |
dewey-tens |
070 - News media, journalism & publishing 000 - Computer science, knowledge & systems |
hierarchy_top_title |
Multimedia tools and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 |
title |
More secure lossless visible watermarking by DCT |
ctrlnum |
(DE-627)OLC2035045592 (DE-He213)s11042-017-4753-3-p |
title_full |
More secure lossless visible watermarking by DCT |
author_sort |
Lin, Yih-Kai |
journal |
Multimedia tools and applications |
journalStr |
Multimedia tools and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2017 |
contenttype_str_mv |
txt |
container_start_page |
8579 |
author_browse |
Lin, Yih-Kai Yang, Cheng-Hsing Tsai, Jinn-Tsong |
container_volume |
77 |
class |
070 004 VZ |
format_se |
Aufsätze |
author-letter |
Lin, Yih-Kai |
doi_str_mv |
10.1007/s11042-017-4753-3 |
dewey-full |
070 004 |
title_sort |
more secure lossless visible watermarking by dct |
title_auth |
More secure lossless visible watermarking by DCT |
abstract |
Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility. © Springer Science+Business Media New York 2017 |
abstractGer |
Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility. © Springer Science+Business Media New York 2017 |
abstract_unstemmed |
Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility. © Springer Science+Business Media New York 2017 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 |
container_issue |
7 |
title_short |
More secure lossless visible watermarking by DCT |
url |
https://doi.org/10.1007/s11042-017-4753-3 |
remote_bool |
false |
author2 |
Yang, Cheng-Hsing Tsai, Jinn-Tsong |
author2Str |
Yang, Cheng-Hsing Tsai, Jinn-Tsong |
ppnlink |
189064145 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11042-017-4753-3 |
up_date |
2024-07-03T23:34:54.550Z |
_version_ |
1803602828516655104 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035045592</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503193450.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-017-4753-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035045592</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-017-4753-3-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lin, Yih-Kai</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">More secure lossless visible watermarking by DCT</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2017</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">DCT</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Watermarking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Lossless</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Integer mapping</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Cheng-Hsing</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsai, Jinn-Tsong</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">77(2017), 7 vom: 05. Mai, Seite 8579-8601</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:77</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:7</subfield><subfield code="g">day:05</subfield><subfield code="g">month:05</subfield><subfield code="g">pages:8579-8601</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-017-4753-3</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">77</subfield><subfield code="j">2017</subfield><subfield code="e">7</subfield><subfield code="b">05</subfield><subfield code="c">05</subfield><subfield code="h">8579-8601</subfield></datafield></record></collection>
|
score |
7.401101 |