Abstract
A new asymmetric watermarking scheme is proposed in this letter. In the proposed scheme, a secret real fractional DCT-I transform and a primitive watermark are employed to generate an asymmetric watermark. The secret watermark for embedding is derived from the primitive watermark, and is embedded in the large fractional DCT-I transformation coefficients of a cover signal. The asymmetric detection procedure is performed using a correlation test. Simulation results showed that the asymmetric detection is reliable, and that the scheme can provide minimum security.
References
Choi, H., Lee, K., Kim, T., 2004. Transformed-key asymmetric watermarking system. IEEE Signal Process Lett., 11(2):251–254. [doi: 10.1109/LSP.2003.819873]
Cox, J., Miller, M.L., Bloom, J.A., 2001. Digital Watermarking. Morgan Kaufmann Publishers, San Francisco, CA, USA.
Eggers, J.J., Su, J.K., Girod, B., 2000. Asymmetric Watermarking Schemes. Tagungsband Des GI Workshops Sicherheit in Mediendaten. Berlin, Germany, p.107–123.
Kim, T.Y., Choi, H., Lee, K., Kim, T., 2004. An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark. IEEE Signal Process Lett., 11(3):375–377. [doi:10.1109/LSP.2003.822923]
Pei, S.C., Yeh, M.H., 2001. The discrete fractional cosine and sine transforms. IEEE Trans. Signal Processing, 49(6):1198–1207. [doi:10.1109/78.923302]
Venturini, I., Duhamel, P., 2004. Reality preserving fractional transforms. IEEE Int. Conf. Acoustics, Speech, and Signal Process, 5:205–208.
Author information
Authors and Affiliations
Additional information
Project (Nos. 60372076 and 60272082) supported by the National Natural Science Foundation of China
Rights and permissions
About this article
Cite this article
Gui, Gf., Jiang, Lg. & He, C. A new asymmetric watermarking scheme based on a real fractional DCT-I transform. J. Zhejiang Univ. - Sci. A 7, 285–288 (2006). https://doi.org/10.1631/jzus.2006.A0285
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/jzus.2006.A0285