CLC number: TP309
On-line Access:
Received: 2005-08-25
Revision Accepted: 2005-12-28
Crosschecked: 0000-00-00
Cited: 1
Clicked: 5407
Gui Guo-fu, Jiang Ling-ge, He Chen. A new asymmetric watermarking scheme based on a real fractional DCT-I transform[J]. Journal of Zhejiang University Science A, 2006, 7(3): 285-288.
@article{title="A new asymmetric watermarking scheme based on a real fractional DCT-I transform",
author="Gui Guo-fu, Jiang Ling-ge, He Chen",
journal="Journal of Zhejiang University Science A",
volume="7",
number="3",
pages="285-288",
year="2006",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2006.A0285"
}
%0 Journal Article
%T A new asymmetric watermarking scheme based on a real fractional DCT-I transform
%A Gui Guo-fu
%A Jiang Ling-ge
%A He Chen
%J Journal of Zhejiang University SCIENCE A
%V 7
%N 3
%P 285-288
%@ 1673-565X
%D 2006
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2006.A0285
TY - JOUR
T1 - A new asymmetric watermarking scheme based on a real fractional DCT-I transform
A1 - Gui Guo-fu
A1 - Jiang Ling-ge
A1 - He Chen
J0 - Journal of Zhejiang University Science A
VL - 7
IS - 3
SP - 285
EP - 288
%@ 1673-565X
Y1 - 2006
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2006.A0285
Abstract: A new asymmetric watermarking scheme is proposed in this letter. In the proposed scheme, a secret real fractional DCT-I transform and a primitive watermark are employed to generate an asymmetric watermark. The secret watermark for embedding is derived from the primitive watermark, and is embedded in the large fractional DCT-I transformation coefficients of a cover signal. The asymmetric detection procedure is performed using a correlation test. Simulation results showed that the asymmetric detection is reliable, and that the scheme can provide minimum security.
[1] Choi, H., Lee, K., Kim, T., 2004. Transformed-key asymmetric watermarking system. IEEE Signal Process Lett., 11(2):251-254.
[2] Cox, J., Miller, M.L., Bloom, J.A., 2001. Digital Watermarking. Morgan Kaufmann Publishers, San Francisco, CA, USA.
[3] Eggers, J.J., Su, J.K., Girod, B., 2000. Asymmetric Watermarking Schemes. Tagungsband Des GI Workshops Sicherheit in Mediendaten. Berlin, Germany, p.107-123.
[4] Kim, T.Y., Choi, H., Lee, K., Kim, T., 2004. An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark. IEEE Signal Process Lett., 11(3):375-377.
[5] Pei, S.C., Yeh, M.H., 2001. The discrete fractional cosine and sine transforms. IEEE Trans. Signal Processing, 49(6):1198-1207.
[6] Venturini, I., Duhamel, P., 2004. Reality preserving fractional transforms. IEEE Int. Conf. Acoustics, Speech, and Signal Process, 5:205-208.
Open peer comments: Debate/Discuss/Question/Opinion
<1>