Private and Blind Digital Fingerprinting Schemes Based upon Complete Complementary Codes

被引:0
|
作者
Kojima, Tetsuya [1 ]
Ohtani, Naoki [2 ]
机构
[1] Tokyo Natl Coll Technol, Dept Comp Sci, Hachioji, Tokyo 1930997, Japan
[2] NHK Media Technol Inc, Tokyo 1500047, Japan
基金
日本学术振兴会;
关键词
WATERMARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Complete complementary code is a family of the spread spectrum sequences with good correlation properties. In this study, the properties of the private and the blind digital fingerprinting schemes using complete complementary codes were evaluated. It is revealed that the proposed scheme is sufficiently robust against collusion attacks by employing a large embedding coefficient in the private case. In addition, in the blind case where the source image cannot be referred to, it was shown that the robustness against collusion attacks could be improved by applying a method called QIM (quantization index modulation) and employing a set of appropriate parameters.
引用
收藏
页码:806 / 810
页数:5
相关论文
共 34 条
  • [1] On Digital Watermarks Based on Complete Complementary Codes
    Horii, Yoshiya
    Kojima, Tetsuya
    IWSDA'09: PROCEEDINGS OF THE FOURTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2009, : 126 - 129
  • [2] Dual-tree Complex Wavelet Transform Blind Video Watermark Based on Complete Complementary Codes
    Jiao, Donghang
    Xue, Yanming
    Wang, Cong
    Gao, Fei
    2014 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2014, : 250 - 253
  • [3] Radar and communication integration based on complete complementary codes
    Qi, Linlin
    Yao, Yuan
    Wu, Guangxin
    JOURNAL OF ENGINEERING-JOE, 2019, 2019 (21): : 7730 - 7733
  • [4] An Improvement of Steganography Scheme Based on Complete Complementary Codes
    Mayuzumi, Ryusuke
    Kojima, Tetsuya
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 638 - 642
  • [5] Password authentication schemes based upon digital signature schemes
    Qi, Ming
    Zhang, Ling
    Tang, Shaohua
    Xiao, Guozhen
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 18 (11): : 43 - 49
  • [6] An Improvement of the Data Hiding Scheme Based on Complete Complementary Codes
    Kojima, Tetsuya
    Mayuzumi, Ryusuke
    2015 SEVENTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS (IWSDA), 2015, : 85 - 89
  • [7] Properties of a Convoluted-Time and Code Division Multiple Access Communication Systems Based upon Complete Complementary Codes
    Kojima, Tetsuya
    Aono, Masahiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10): : 2881 - 2884
  • [8] Digital Watermarking Algorithm Based on Complete Complementary Code
    Channapragada, Rama Seshagiri Rao
    Prasad, Munaga V. N. K.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [9] Omnidirectional Beamforming Based on Complete Complementary Codes for Uniform Rectangular Array
    Jiang, Yi
    Su, Dongliang
    Wang, Xin
    2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 871 - 874
  • [10] A New Demodulation Procedure for CDMA Systems Based on Complete Complementary Codes
    Mayuzumi, Ryusuke
    Kojima, Tetsuya
    IWSDA'09: PROCEEDINGS OF THE FOURTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2009, : 122 - 125