The letter describes a phase perturbation attack to the Discrete Fourier Transform (DFT) and Phase Shift Keying (PSK) based watermarking scheme which is proposed in [3]. In that paper the watermark information is embedded in the phase of the DFT coefficients. But this kind of PSK based watermarking scheme is very vulnerable to the phase perturbation attack, when some noise is added on the phase of the DFT coefficients, the watermark can't be correctly extracted anymore, while the quality degradation of the attacked watermarked image is visually acceptable.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Jeng-Shyang PAN, Chuang LIN, "Attacking Phase Shift Keying Based Watermarking" in IEICE TRANSACTIONS on Fundamentals,
vol. E90-A, no. 1, pp. 305-306, January 2007, doi: 10.1093/ietfec/e90-a.1.305.
Abstract: The letter describes a phase perturbation attack to the Discrete Fourier Transform (DFT) and Phase Shift Keying (PSK) based watermarking scheme which is proposed in [3]. In that paper the watermark information is embedded in the phase of the DFT coefficients. But this kind of PSK based watermarking scheme is very vulnerable to the phase perturbation attack, when some noise is added on the phase of the DFT coefficients, the watermark can't be correctly extracted anymore, while the quality degradation of the attacked watermarked image is visually acceptable.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e90-a.1.305/_p
Copy
@ARTICLE{e90-a_1_305,
author={Jeng-Shyang PAN, Chuang LIN, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Attacking Phase Shift Keying Based Watermarking},
year={2007},
volume={E90-A},
number={1},
pages={305-306},
abstract={The letter describes a phase perturbation attack to the Discrete Fourier Transform (DFT) and Phase Shift Keying (PSK) based watermarking scheme which is proposed in [3]. In that paper the watermark information is embedded in the phase of the DFT coefficients. But this kind of PSK based watermarking scheme is very vulnerable to the phase perturbation attack, when some noise is added on the phase of the DFT coefficients, the watermark can't be correctly extracted anymore, while the quality degradation of the attacked watermarked image is visually acceptable.},
keywords={},
doi={10.1093/ietfec/e90-a.1.305},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Attacking Phase Shift Keying Based Watermarking
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 305
EP - 306
AU - Jeng-Shyang PAN
AU - Chuang LIN
PY - 2007
DO - 10.1093/ietfec/e90-a.1.305
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E90-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2007
AB - The letter describes a phase perturbation attack to the Discrete Fourier Transform (DFT) and Phase Shift Keying (PSK) based watermarking scheme which is proposed in [3]. In that paper the watermark information is embedded in the phase of the DFT coefficients. But this kind of PSK based watermarking scheme is very vulnerable to the phase perturbation attack, when some noise is added on the phase of the DFT coefficients, the watermark can't be correctly extracted anymore, while the quality degradation of the attacked watermarked image is visually acceptable.
ER -