Robust Watermark Against Double Attacks of Compression and Cropping

被引:0
|
作者
Takatsuka, Masahiro [1 ]
Yutaka, Masaaki Kajihara [1 ]
Hirakawa [1 ]
Ohzeki, Kazuo [1 ]
机构
[1] Shibaura Inst Technol, Grad Sch Engn & Sci, Tokyo, Japan
关键词
watermark; double attacks; DCT; shift;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The authors propose a robust watermark method to cope with the situation when double attacks simultaneously occur. Under a JPEG compression attack and cropping attack whose arbitrary positions to be attacked are assumed. Experiments with a heavy JPEG compression rate of 1/33 show a satisfactory detection ratio of 99.9%.
引用
收藏
页码:200 / 201
页数:2
相关论文
共 50 条
  • [1] A robust grayscale watermark algorithm against geometric attacks
    Gao, Guangyong
    Deng, Anyuan
    Zhou, Mingfa
    Gong, Jinlin
    [J]. Journal of Computational Information Systems, 2010, 6 (09): : 3117 - 3125
  • [2] Wavelet Audio Watermark Robust Against MPEG Compression
    Artameeyanant, Patcharin
    [J]. INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 1375 - 1378
  • [3] Wavelet audio watermark robust against MPEG compression
    Artameeyanant, Patcharin
    [J]. PROCEEDINGS OF SICE ANNUAL CONFERENCE, VOLS 1-8, 2007, : 1410 - 1413
  • [4] Robust watermarking against arbitrary scaling and cropping attacks
    Wu, Shaowu
    Lu, Wei
    Yin, Xiaolin
    Yang, Rui
    [J]. SIGNAL PROCESSING, 2025, 226
  • [5] Tabu searching for watermarldng robust against compression and cropping
    Artameeyanant, Patcharin
    [J]. 2006 SICE-ICASE International Joint Conference, Vols 1-13, 2006, : 1331 - 1333
  • [6] A Robust DCT Based Technique for Image Watermarking Against Cropping Attacks
    Rajabi, Mohammad Javad
    Abdullah, Shahidan M.
    Bakhtiari, Majid
    Bakhtiari, Saeid
    [J]. RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2018, 5 : 747 - 757
  • [7] A new robust video watermarking algorithm against cropping and rotating attacks
    Bahrami, Zhila
    Akhlaghian, Fardin
    [J]. 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 122 - 127
  • [8] Adversarial watermark: A robust and reliable watermark against removal
    Wang, Jinwei
    Huang, Wanyun
    Zhang, Jiawei
    Luo, Xiangyang
    Ma, Bin
    [J]. Journal of Information Security and Applications, 2024, 82
  • [9] Adversarial watermark: A robust and reliable watermark against removal
    Wang, Jinwei
    Huang, Wanyun
    Zhang, Jiawei
    Luo, Xiangyang
    Ma, Bin
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
  • [10] Results of attacks on a claimed robust digital image watermark
    Braudaway, GW
    [J]. OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES II, 1998, 3314 : 122 - 131