The letter proposes a novel subsampling-based digital image watermarking scheme resisting the permutation attack. The subsampling-based watermarking schemes have drawn great attention for their convenience and effectiveness in recent years, but the traditional subsampling-based watermarking schemes are very vulnerable to the permutation attack. In this letter, the watermark information is embedded in the average values of the 1-level DWT coefficients to resist the permutation attack. The concrete embedding process is achieved by the quantization-based method. Experimental results show that the proposed scheme can resist not only the permutation attack but also some common image processing attacks.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Chuang LIN, Jeng-Shyang PAN, Chia-An HUANG, "A Subsampling-Based Digital Image Watermarking Scheme Resistant to Permutation Attack" in IEICE TRANSACTIONS on Fundamentals,
vol. E91-A, no. 3, pp. 911-915, March 2008, doi: 10.1093/ietfec/e91-a.3.911.
Abstract: The letter proposes a novel subsampling-based digital image watermarking scheme resisting the permutation attack. The subsampling-based watermarking schemes have drawn great attention for their convenience and effectiveness in recent years, but the traditional subsampling-based watermarking schemes are very vulnerable to the permutation attack. In this letter, the watermark information is embedded in the average values of the 1-level DWT coefficients to resist the permutation attack. The concrete embedding process is achieved by the quantization-based method. Experimental results show that the proposed scheme can resist not only the permutation attack but also some common image processing attacks.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e91-a.3.911/_p
Copy
@ARTICLE{e91-a_3_911,
author={Chuang LIN, Jeng-Shyang PAN, Chia-An HUANG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A Subsampling-Based Digital Image Watermarking Scheme Resistant to Permutation Attack},
year={2008},
volume={E91-A},
number={3},
pages={911-915},
abstract={The letter proposes a novel subsampling-based digital image watermarking scheme resisting the permutation attack. The subsampling-based watermarking schemes have drawn great attention for their convenience and effectiveness in recent years, but the traditional subsampling-based watermarking schemes are very vulnerable to the permutation attack. In this letter, the watermark information is embedded in the average values of the 1-level DWT coefficients to resist the permutation attack. The concrete embedding process is achieved by the quantization-based method. Experimental results show that the proposed scheme can resist not only the permutation attack but also some common image processing attacks.},
keywords={},
doi={10.1093/ietfec/e91-a.3.911},
ISSN={1745-1337},
month={March},}
Copy
TY - JOUR
TI - A Subsampling-Based Digital Image Watermarking Scheme Resistant to Permutation Attack
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 911
EP - 915
AU - Chuang LIN
AU - Jeng-Shyang PAN
AU - Chia-An HUANG
PY - 2008
DO - 10.1093/ietfec/e91-a.3.911
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E91-A
IS - 3
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - March 2008
AB - The letter proposes a novel subsampling-based digital image watermarking scheme resisting the permutation attack. The subsampling-based watermarking schemes have drawn great attention for their convenience and effectiveness in recent years, but the traditional subsampling-based watermarking schemes are very vulnerable to the permutation attack. In this letter, the watermark information is embedded in the average values of the 1-level DWT coefficients to resist the permutation attack. The concrete embedding process is achieved by the quantization-based method. Experimental results show that the proposed scheme can resist not only the permutation attack but also some common image processing attacks.
ER -