Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 432740, 6 pages
http://dx.doi.org/10.1155/2014/432740
Research Article

The Theoretical Limits of Watermark Spread Spectrum Sequence

1College of Computer, Beijing University of Technology, Beijing 100124, China
2School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China

Received 30 August 2013; Accepted 2 March 2014; Published 23 March 2014

Academic Editors: J. Shu and F. Yu

Copyright © 2014 Nan Jiang and Jian Wang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. J. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann Publishers, San Francisco, Calif, USA, 2nd revised edition, 2007.
  2. F. P. Gonzalez and S. Voloshynovskiy, Fundamentals of Digital Image Watermarking, John Wiley & Sons, New York, NY, USA, 2009.
  3. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997. View at Publisher · View at Google Scholar · View at Scopus
  4. S. Maity, J. Sil, S. P. Maity, and C. Delpha, “Optimized spread spectrum watermarking for fading-like collusion attack,” in Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications: Communications, Networking and Applications for the Internet of Things (WPMC '11), pp. 1–5, October 2011. View at Scopus
  5. F. Zhang, W. Liu, W. Lin, and K. N. Ngan, “Spread spectrum image watermarking based on perceptual quality metric,” IEEE Transactions on Image Processing, vol. 20, no. 11, pp. 3207–3218, 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. L. Cui and W. Li, “Adaptive multiwavelet-based watermarking through JPW masking,” IEEE Transactions on Image Processing, vol. 20, no. 4, pp. 1047–1060, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Kuribayashi and H. Kato, “Impact of rounding error on spread spectrum fingerprinting scheme,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 670–680, 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Valizadeh and Z. J. Wang, “An improved multiplicative spread spectrum embedding scheme for data hiding,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1127–1143, 2012. View at Publisher · View at Google Scholar
  9. H. O. Altun, A. Orsdemir, G. Sharma, and M. F. Bocko, “Optimal spread spectrum watermark embedding via a multistep feasibility formulation,” IEEE Transactions on Image Processing, vol. 18, no. 2, pp. 371–387, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Wu and S. Yeo, “Obscure Spread Spectrum watermarking,” in Proceedings of the 2011 12th IEEE International Conference on Multimedia and Expo (ICME '11), pp. 1–6, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. H. Liang, “Research on the MPEG-2 video watermarking scheme based on spread spectrum technology,” in Proceedings of the 2009 International Conference on Compute Engineering and Technology (ICCET '09), vol. 2, pp. 408–411, 2009. View at Publisher · View at Google Scholar
  12. Y.-H. Chen and J.-C. Chen, “A new multiple audio watermarking algorithm applying ds-cdma,” in Proceedings of the 2009 International Conference on Machine Learning and Cybernetics, pp. 2205–2210, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Xiwen, “The application of digital watermarking technology in the field of e-commerce,” in Proceedings of the 3rd International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII '10), pp. 380–383, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. M. Kuribayashi, “Interference removal operation for spread spectrum fingerprinting scheme,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 403–417, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. F. Jun and W. Shou-Huai, “An adaptive spread spectrum watermarking algorithm based on orthogonal Walsh codes,” in Proceedings of the 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet '11), pp. 2912–2914, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. H. Mahdipour, H. Salehinejad, and S. Talebi, “MPEG-2 standard system: a new blind watermarking approach using spread spectrum method,” in Proceedings of the 2008 International Symposium on Telecommunications (IST '08), pp. 719–724, August 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. K. Feltekh and Z. Ben Jemaa, “Chaos based spread spectrum watermarking algorithm,” in Proceedings of the 2011 International Conference on Communications, Computing and Control Applications (ICCCA '11), pp. 1–5, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. L. Nian-sheng, Y. Guo-Hao, G. Dong-Hui, and L. L. Cheng, “A new wavelet watermark scheme of color image based on chaotic sequences,” in Proceedings of the 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing (IIH-MSP '08), pp. 994–998, August 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. T. Kojima, Y. Horii, N. Ohtani, and T. Sene, “On some properties of a digital watermarking based on complete complementary codes,” in Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '10), pp. 498–501, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. J. Huang, X. Pan, X. Fu, and J. Wang, “Long PN code based DSSS watermarking,” in Proceedings of the IEEE INFOCOM 2011, pp. 2426–2434, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. N. Deng and C. S. Jiang, “CDMA watermarking algorithm based on wavelet basis,” in Proceedings of the 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (ICFSKD '12), pp. 2148–2152, May 2012. View at Publisher · View at Google Scholar
  22. L. R. Welch, “Lower bounds on the maximum cross correlation of signals,” IEEE Transactions on Information Theory, vol. 20, no. 3, pp. 397–399, 1974. View at Google Scholar · View at Scopus
  23. K. G. Paterson and P. J. G. Lothian, “Bounds on partial correlations of sequences,” IEEE Transactions on Information Theory, vol. 44, no. 3, pp. 1164–1175, 1998. View at Publisher · View at Google Scholar · View at Scopus
  24. D. V. Sarwate, “Bounds on crosscorrelation and autocorrelation of sequences,” IEEE Transactions on Information Theory, vol. 25, no. 6, pp. 720–724, 1979. View at Google Scholar · View at Scopus
  25. V. I. Levenshtein, “New lower bounds on aperiodic crosscorrelation of binary codes,” IEEE Transactions on Information Theory, vol. 45, no. 1, pp. 284–288, 1999. View at Publisher · View at Google Scholar · View at Scopus