2016
DOI: 10.1007/978-3-319-31960-5_22
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking Method Using Concatenated Code for Scaling and Rotation Attacks

Abstract: Abstract. We proposed a watermarking method using a concatenated code and evaluated the method on the basis of IHC evaluation criteria. The criteria include JPEG compression, clipping, scaling, and rotation as attacks. For the robustness of messages, we introduced concatenated code, since it has a high error corrective ability to decode messages against JPEG compression. When a region is cropped from a stego-image, the position of watermarks might be unclear. Therefore, markers or synchronization codes were em… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
18
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2
1
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(19 citation statements)
references
References 10 publications
1
18
0
Order By: Relevance
“…4. More precisely, the proposed method is able to extract a watermark at the same computational cost as that of Hirata and Kawamura's method [13] and yields stego-images of higher quality than those obtained using the method proposed by Ogawa et al [14] under the condition of IHC ver. 4.…”
Section: Introductionmentioning
confidence: 89%
See 4 more Smart Citations
“…4. More precisely, the proposed method is able to extract a watermark at the same computational cost as that of Hirata and Kawamura's method [13] and yields stego-images of higher quality than those obtained using the method proposed by Ogawa et al [14] under the condition of IHC ver. 4.…”
Section: Introductionmentioning
confidence: 89%
“…In other words, the attacks may cause errors in the watermark. Digital watermarking methods avoid these errors by using spread-spectrum techniques or correct them by using error-correcting codes [4]- [6], [10]- [13]. A watermarking method that uses an error-correcting code embeds as a watermark the codeword generated from a message.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations