You are not logged in.

Rank-based Image watermarking method with high embedding capacity and robustness

Zong, Tianrui, Xiang, Yong, Guo, Song and Rong, Yue 2016, Rank-based Image watermarking method with high embedding capacity and robustness, IEEE, vol. 4, pp. 1689-1699, doi: 10.1109/ACCESS.2016.2556723.

Attached Files
Name Description MIMEType Size Downloads

Title Rank-based Image watermarking method with high embedding capacity and robustness
Author(s) Zong, Tianrui
Xiang, YongORCID iD for Xiang, Yong orcid.org/0000-0003-3545-7863
Guo, Song
Rong, Yue
Journal name IEEE
Volume number 4
Start page 1689
End page 1699
Total pages 11
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2016
ISSN 2169-3536
Keyword(s) Science & Technology
Technology
Computer Science, Information Systems
Engineering, Electrical & Electronic
Telecommunications
Computer Science
Engineering
Image watermarking
host signal interference
discrete cosine transform
high embedding capacity
QUANTIZATION-BASED WATERMARKING
SPREAD-SPECTRUM
DIGITAL WATERMARKING
INDEX MODULATION
Summary This paper presents a novel rank-based method for image watermarking. In the watermark embedding process, the host image is divided into blocks, followed by the 2-D discrete cosine transform (DCT). For each image block, a secret key is employed to randomly select a set of DCT coefficients suitable for watermark embedding. Watermark bits are inserted into an image block by modifying the set of DCT coefficients using a rank-based embedding rule. In the watermark detection process, the corresponding detection matrices are formed from the received image using the secret key. Afterward, the watermark bits are extracted by checking the ranks of the detection matrices. Since the proposed watermarking method only uses two DCT coefficients to hide one watermark bit, it can achieve very high embedding capacity. Moreover, our method is free of host signal interference. This desired feature and the usage of an error buffer in watermark embedding result in high robustness against attacks. Theoretical analysis and experimental results demonstrate the effectiveness of the proposed method.
Language eng
DOI 10.1109/ACCESS.2016.2556723
Field of Research 080106 Image Processing
Socio Economic Objective 890402 Film and Video Services (excl. Animation and Computer Generated Imagery)
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2016, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30083944

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 122 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Fri, 29 Jul 2016, 11:13:25 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.