Skip to main content

Watermarking Method Using Concatenated Code for Scaling and Rotation Attacks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9569))

Abstract

We proposed a watermarking method using a concatenated code and evaluated the method on the basis of IHC evaluation criteria. The criteria include JPEG compression, clipping, scaling, and rotation as attacks. For the robustness of messages, we introduced concatenated code, since it has a high error corrective ability to decode messages against JPEG compression. When a region is cropped from a stego-image, the position of watermarks might be unclear. Therefore, markers or synchronization codes were embedded into the stego-image. Since scaling causes pixel loss, and rotation causes distortion, watermarks were embedded into minified images. Quantization index modulation was used for embedding and extracting the watermarks without the original images. As a result, our method was evaluated on the basis of highest image quality and could achieve an average peak signal-to-noise ratio of 36.250 dB. Moreover, our method was evaluated on the basis of highest tolerance and could achieve an average compression ratio of \(2.633\,\%\) without errors.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Information hiding and its criteria for evaluation, IEICE. http://www.ieice.org/iss/emm/ihc/en/

  2. Gallager, R.G.: Low-density parity-check codes. IRE Trans. Inf. Theory IT–8(1), 21–28 (1962)

    Article  MathSciNet  MATH  Google Scholar 

  3. MacKay, D.J.C.: Good error-correcting codes based on very sparse matrices. IEEE Trans. Inform. Theory 45, 399–431 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  4. Wadayama, T.: A coded nodulation scheme based on low density parity check codes. IEICE Trans. Fundam. E84–A(10), 2523–2527 (2001)

    Google Scholar 

  5. Hirata, N., Kawamura, M.: Digital watermarking method using LDPC code for clipped image. In: Proceedings of the 1st International Workshop on Information Hiding and its Criteria for Evaluation, IWIHC2014, pp. 25–30 (2014)

    Google Scholar 

  6. Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  7. Forney Jr., G.D.: Concatenated Codes. MIT Press, Cambridge (1966)

    MATH  Google Scholar 

  8. ETSI EN 302 755, V1.3.1, Digital Video Broadcasting (DVB); Frame structure channel coding and modulation for a second generation digital terrestrial television broadcasting system (2012)

    Google Scholar 

  9. Hocquenghem, A.: Codes correcteurs d’Erreurs. Chiffres 2, 147–156 (1959)

    MathSciNet  MATH  Google Scholar 

  10. Bose, R.C., Ray-Chaudhuri, D.K.: On a class of error correcting binary group codes. Inf. Control 3(1), 68–79 (1960)

    Article  MathSciNet  MATH  Google Scholar 

  11. Yamamoto, T., Kawamura, M.: Method of spread spectrum watermarking using quantization index modulation for cropped images. IEICE Trans. Inf. Syst. E98–D(7), 1306–1315 (2015)

    Article  Google Scholar 

  12. Fang, Y., Huang, J., Wu, S.: CDMA-based watermarking resisting to cropping. In: Proceedings of 2004 International Symposium on Circuits and Systems, ISCAS 2004, vol. 2, pp. 25–28 (2004)

    Google Scholar 

  13. Hakka, M., Kuribayashi, M., Morii, M.: DCT-OFDM based watermarking scheme robust against clipping attack, IEICE Technical report, vol. 113, no. 291, pp. 107–112 (2013). (in Japanese)

    Google Scholar 

  14. Srinivasan, M., Sarwate, D.V.: Malfunction in the Peterson-Gorenstein-Zierler decoder. IEEE Trans. Inf. Theory 40(5), 1649–1653 (1994)

    Article  MATH  Google Scholar 

  15. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by JSPS KAKENHI Grant Number 25330028 and was partially supported by the Cooperative Research Project, RIEC in Tohoku University. The computer simulations were carried out on PC clusters at Yamaguchi University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Masaki Kawamura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Hirata, N., Kawamura, M. (2016). Watermarking Method Using Concatenated Code for Scaling and Rotation Attacks. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31960-5_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31959-9

  • Online ISBN: 978-3-319-31960-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics