Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016 (2016), Article ID 9029745, 16 pages
http://dx.doi.org/10.1155/2016/9029745
Research Article

A New Scalar Quantization Method for Digital Image Watermarking

Computer Science, School of Information Sciences, University of Tampere, Kanslerinrinne 1, 33014 Tampere, Finland

Received 7 October 2015; Revised 18 January 2016; Accepted 24 January 2016

Academic Editor: Mazdak Zamani

Copyright © 2016 Yevhen Zolotavkin and Martti Juhola. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press, New York, NY, USA, 2009. View at MathSciNet
  2. M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “Robust watermarking of still images for copyright protection,” in Proceedings of 13th International Conference on Digital Signal Processing (DSP '97), vol. 2, pp. 499–502, Santorini, Greece, July 1997. View at Publisher · View at Google Scholar
  3. H. R. Sheikh and A. C. Bovik, “Image information and visual quality,” IEEE Transactions on Image Processing, vol. 15, no. 2, pp. 430–444, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann Publishers, San Francisco, Calif, USA, 2nd edition, 2007.
  5. T. Bianchi and A. Piva, “Secure watermarking for multimedia content protection: a review of its benefits and open issues,” IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 87–96, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. M. H. Costa, “Writing on dirty paper,” IEEE Transactions on Information Theory, vol. 29, no. 3, pp. 439–441, 1983. View at Publisher · View at Google Scholar · View at MathSciNet
  7. B. Chen and G. W. Wornell, “Dither modulation: a new approach to digital watermarking and information embedding,” in Security and Watermarking of Multimedia Contents, vol. 3657 of Proceedings of SPIE, pp. 342–353, San Jose, Calif, USA, April 1999. View at Publisher · View at Google Scholar
  8. B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423–1443, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. E. Esen and A. Alatan, “Forbidden zone data hiding,” in Proceedings of the IEEE International Conference on Image Processing, pp. 1393–1396, Atlanta, Ga, USA, October 2006. View at Publisher · View at Google Scholar
  10. M. Ramkumar and A. N. Akansu, “Signalling methods for multimedia steganography,” IEEE Transactions on Signal Processing, vol. 52, no. 4, pp. 1100–1111, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, “Scalar Costa scheme for information embedding,” IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 1003–1019, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. J. Oostveen, T. Kalker, and M. Staring, “Adaptive quantization watermarking,” in Security, Steganography, and Watermarking of Multimedia Contents VI, Proceedings of SPIE, pp. 296–303, San Jose, Calif, USA, January 2004. View at Publisher · View at Google Scholar
  13. X. Kang, J. Huang, and W. Zeng, “Improving robustness of quantization-based image watermarking via adaptive receiver,” IEEE Transactions on Multimedia, vol. 10, no. 6, pp. 953–959, 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. I. D. Shterev and R. L. Lagendijk, “Amplitude scale estimation for quantization-based watermarking,” IEEE Transactions on Signal Processing, vol. 54, no. 11, pp. 4146–4155, 2006. View at Publisher · View at Google Scholar · View at Scopus
  15. F. Pérez-González, C. Mosquera, M. Barni, and A. Abrardo, “Rational dither modulation: a high-rate data-hiding method invariant to gain attacks,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3960–3975, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  16. F. Ourique, V. Licks, R. Jordan, and F. Pérez-González, “Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05), vol. 2, pp. ii/797–ii/800, IEEE, Philadelphia, Pa, USA, March 2005. View at Publisher · View at Google Scholar · View at Scopus
  17. M. Zareian and H. R. Tohidypour, “Robust quantisation index modulation-based approach for image watermarking,” IET Image Processing, vol. 7, no. 5, pp. 432–441, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. X. Zhu and J. Ding, “Performance analysis and improvement of dither modulation under the composite attacks,” EURASIP Journal on Advances in Signal Processing, vol. 2012, no. 1, article 53, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. Q. Sang, X. Wu, C. Li, and Y. Lu, “Universal blind image quality assessment using contourlet transform and singular-value decomposition,” Journal of Electronic Imaging, vol. 23, no. 6, Article ID 061104, 2014. View at Publisher · View at Google Scholar
  20. S. Chikkerur, V. Sundaram, M. Reisslein, and L. J. Karam, “Objective video quality assessment methods: a classification, review, and performance comparison,” IEEE Transactions on Broadcasting, vol. 57, no. 2, pp. 165–182, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Petrou and C. Petrou, Image Processing: The Fundamentals, John Wiley & Sons, 2010.
  22. Y. Zolotavkin and M. Juhola, “A new blind adaptive watermarking method based on singular value decomposition,” in Proceedings of the International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS '13), pp. 184–192, Taipei, Taiwan, March 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. W. Pan, G. Coatrieux, N. Cuppens-Boulahia, F. Cuppens, and C. Roux, “Watermarking to enforce medical image access and usage control policy,” in Proceedings of the 6th International Conference on Signal-Image Technology and Internet-Based Systems (SITIS '10), pp. 251–260, IEEE, Kuala Lumpur, Malaysia, December 2010. View at Publisher · View at Google Scholar · View at Scopus