Abstract
We proposed a watermarking method using a concatenated code and evaluated the method on the basis of IHC evaluation criteria. The criteria include JPEG compression, clipping, scaling, and rotation as attacks. For the robustness of messages, we introduced concatenated code, since it has a high error corrective ability to decode messages against JPEG compression. When a region is cropped from a stego-image, the position of watermarks might be unclear. Therefore, markers or synchronization codes were embedded into the stego-image. Since scaling causes pixel loss, and rotation causes distortion, watermarks were embedded into minified images. Quantization index modulation was used for embedding and extracting the watermarks without the original images. As a result, our method was evaluated on the basis of highest image quality and could achieve an average peak signal-to-noise ratio of 36.250 dB. Moreover, our method was evaluated on the basis of highest tolerance and could achieve an average compression ratio of \(2.633\,\%\) without errors.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Information hiding and its criteria for evaluation, IEICE. http://www.ieice.org/iss/emm/ihc/en/
Gallager, R.G.: Low-density parity-check codes. IRE Trans. Inf. Theory IT–8(1), 21–28 (1962)
MacKay, D.J.C.: Good error-correcting codes based on very sparse matrices. IEEE Trans. Inform. Theory 45, 399–431 (1999)
Wadayama, T.: A coded nodulation scheme based on low density parity check codes. IEICE Trans. Fundam. E84–A(10), 2523–2527 (2001)
Hirata, N., Kawamura, M.: Digital watermarking method using LDPC code for clipped image. In: Proceedings of the 1st International Workshop on Information Hiding and its Criteria for Evaluation, IWIHC2014, pp. 25–30 (2014)
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)
Forney Jr., G.D.: Concatenated Codes. MIT Press, Cambridge (1966)
ETSI EN 302 755, V1.3.1, Digital Video Broadcasting (DVB); Frame structure channel coding and modulation for a second generation digital terrestrial television broadcasting system (2012)
Hocquenghem, A.: Codes correcteurs d’Erreurs. Chiffres 2, 147–156 (1959)
Bose, R.C., Ray-Chaudhuri, D.K.: On a class of error correcting binary group codes. Inf. Control 3(1), 68–79 (1960)
Yamamoto, T., Kawamura, M.: Method of spread spectrum watermarking using quantization index modulation for cropped images. IEICE Trans. Inf. Syst. E98–D(7), 1306–1315 (2015)
Fang, Y., Huang, J., Wu, S.: CDMA-based watermarking resisting to cropping. In: Proceedings of 2004 International Symposium on Circuits and Systems, ISCAS 2004, vol. 2, pp. 25–28 (2004)
Hakka, M., Kuribayashi, M., Morii, M.: DCT-OFDM based watermarking scheme robust against clipping attack, IEICE Technical report, vol. 113, no. 291, pp. 107–112 (2013). (in Japanese)
Srinivasan, M., Sarwate, D.V.: Malfunction in the Peterson-Gorenstein-Zierler decoder. IEEE Trans. Inf. Theory 40(5), 1649–1653 (1994)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Acknowledgments
This work was supported by JSPS KAKENHI Grant Number 25330028 and was partially supported by the Cooperative Research Project, RIEC in Tohoku University. The computer simulations were carried out on PC clusters at Yamaguchi University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Hirata, N., Kawamura, M. (2016). Watermarking Method Using Concatenated Code for Scaling and Rotation Attacks. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-31960-5_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31959-9
Online ISBN: 978-3-319-31960-5
eBook Packages: Computer ScienceComputer Science (R0)