2018 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET) 2018
DOI: 10.1109/imcet.2018.8603038
|View full text |Cite
|
Sign up to set email alerts
|

Blind Image Watermarking using Normalized STDM robust against Fixed Gain Attack

Abstract: Spread Transform Dither Modulation (STDM), as an extension of Quantization Index Modulation (QIM) is a blind watermarking scheme that achieves high robustness against random noise and re-quantization attacks, with a limitation against the Fixed Gain Attack (FGA). In this paper, we improve the STDM watermarking scheme by making the quantization step size dependent on the watermarked content to resist the FGA attack. Simulations on real images show that our approach achieves strong robustness against the FGA att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 19 publications
(20 reference statements)
0
4
0
Order By: Relevance
“…Li and Cox [34] improved the robustness of STDM against amplitude scaling and JPEG compression using a perceptual model based on Watson's model. Hatoum et al [35] proposed a blind image watermarking using Normalized STDM robust against FGA attack, AWGN attack, and JPEG compression. Recently, CNN was exploited for modeling images priors for denoising.…”
Section: Related Workmentioning
confidence: 99%
“…Li and Cox [34] improved the robustness of STDM against amplitude scaling and JPEG compression using a perceptual model based on Watson's model. Hatoum et al [35] proposed a blind image watermarking using Normalized STDM robust against FGA attack, AWGN attack, and JPEG compression. Recently, CNN was exploited for modeling images priors for denoising.…”
Section: Related Workmentioning
confidence: 99%
“…Frequency domain watermarking first involves transforming the host image, commonly including matrix decomposition, three major transformations (namely discrete wavelet transform (DWT) [ 21 , 22 , 23 , 24 , 25 ], discrete cosine transform (DCT) [ 26 , 27 , 28 , 29 , 30 ], and discrete Fourier transform (DFT) [ 31 , 32 , 33 , 34 ]), and other transformations [ 20 , 35 , 36 , 37 , 38 , 39 ], followed by modifying the transform coefficients to embed the watermark.…”
Section: Introductionmentioning
confidence: 99%
“…The watermark is extracted by comparing the levels of the detection matrix generated from the received image using a key, achieving a very high embedding capacity. The scheme proposed by Hatoum et al [ 30 ] adopts spread transform dithering modulation (STDM), which applies DCT to the host image when embedding the watermark, and then embeds the watermark bit through NSTDM (normalized STDM). After applying IDCT in the extraction stage, the NSTDM decoder is implemented to detect the watermark bit.…”
Section: Introductionmentioning
confidence: 99%
“…Spread Transform Dither Modulation (STDM), a special case of Quantization Index Modulation (QIM), has been widely used for digital image watermarking, and in previous work we have applied the STDM watermarking scheme in PDF documents for copyright protection with a tradeoff between the transparency and robustness [4]. STDM achieves high robustness against additive noise attack, but it is largely vulnerable to the FGA attack [16]. In this type of attack, the received signal is indeed multiplied by a gain factor ρ, which scales the watermark vector and shifts it away from its original quantization cell.…”
Section: Introductionmentioning
confidence: 99%