Full Text:   <1206>

CLC number: TP309

On-line Access: 

Received: 2005-08-25

Revision Accepted: 2005-12-28

Crosschecked: 0000-00-00

Cited: 1

Clicked: 3287

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
1. Reference List
Open peer comments

Journal of Zhejiang University SCIENCE A 2006 Vol.7 No.3 P.285~288

http://doi.org/10.1631/jzus.2006.A0285


A new asymmetric watermarking scheme based on a real fractional DCT-I transform


Author(s):  Gui Guo-fu, Jiang Ling-ge, He Chen

Affiliation(s):  Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China

Corresponding email(s):   gf_gui@sjtu.edu.cn

Key Words:  Asymmetric watermarking, DCT-I, Fractional transforms


Share this article to: More |Next Article >>>

Gui Guo-fu, Jiang Ling-ge, He Chen. A new asymmetric watermarking scheme based on a real fractional DCT-I transform[J]. Journal of Zhejiang University Science A, 2006, 7(3): 285~288.

@article{title="A new asymmetric watermarking scheme based on a real fractional DCT-I transform",
author="Gui Guo-fu, Jiang Ling-ge, He Chen",
journal="Journal of Zhejiang University Science A",
volume="7",
number="3",
pages="285~288",
year="2006",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2006.A0285"
}

%0 Journal Article
%T A new asymmetric watermarking scheme based on a real fractional DCT-I transform
%A Gui Guo-fu
%A Jiang Ling-ge
%A He Chen
%J Journal of Zhejiang University SCIENCE A
%V 7
%N 3
%P 285~288
%@ 1673-565X
%D 2006
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2006.A0285

TY - JOUR
T1 - A new asymmetric watermarking scheme based on a real fractional DCT-I transform
A1 - Gui Guo-fu
A1 - Jiang Ling-ge
A1 - He Chen
J0 - Journal of Zhejiang University Science A
VL - 7
IS - 3
SP - 285
EP - 288
%@ 1673-565X
Y1 - 2006
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2006.A0285


Abstract: 
A new asymmetric watermarking scheme is proposed in this letter. In the proposed scheme, a secret real fractional DCT-I transform and a primitive watermark are employed to generate an asymmetric watermark. The secret watermark for embedding is derived from the primitive watermark, and is embedded in the large fractional DCT-I transformation coefficients of a cover signal. The asymmetric detection procedure is performed using a correlation test. Simulation results showed that the asymmetric detection is reliable, and that the scheme can provide minimum security.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1] Choi, H., Lee, K., Kim, T., 2004. Transformed-key asymmetric watermarking system. IEEE Signal Process Lett., 11(2):251-254.

[2] Cox, J., Miller, M.L., Bloom, J.A., 2001. Digital Watermarking. Morgan Kaufmann Publishers, San Francisco, CA, USA.

[3] Eggers, J.J., Su, J.K., Girod, B., 2000. Asymmetric Watermarking Schemes. Tagungsband Des GI Workshops Sicherheit in Mediendaten. Berlin, Germany, p.107-123.

[4] Kim, T.Y., Choi, H., Lee, K., Kim, T., 2004. An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark. IEEE Signal Process Lett., 11(3):375-377.

[5] Pei, S.C., Yeh, M.H., 2001. The discrete fractional cosine and sine transforms. IEEE Trans. Signal Processing, 49(6):1198-1207.

[6] Venturini, I., Duhamel, P., 2004. Reality preserving fractional transforms. IEEE Int. Conf. Acoustics, Speech, and Signal Process, 5:205-208.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE