On Digital Watermarks Based on Complete Complementary Codes

被引:0
|
作者
Horii, Yoshiya [1 ]
Kojima, Tetsuya [1 ]
机构
[1] Tokyo Natl Coll Technol, Tokyo, Japan
关键词
digital watermark; spread sequence; complete complementary code;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Digital watermarking technologies with spread spectrum (SS) sequences have been previously proposed. The sequences used in previous studies, however, do not necessarily have good correlation properties. It is known that complete complementary codes have ideal correlation properties and very effective for mobile communication systems like CDMA. In this paper, it is shown that correlation properties of sequences play very important roles in detecting the embedded secret information from the watermarked images. In addition, we propose a method to embed multiple secret data simultaneously into a single image.
引用
收藏
页码:126 / 129
页数:4
相关论文
共 50 条
  • [21] A Systematic Framework for the Construction of Optimal Complete Complementary Codes
    Han, Chenggao
    Suehiro, Naoki
    Hashimoto, Takeshi
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (09) : 6033 - 6042
  • [22] Multiple access method based on complete complementary codes in ultra wideband wireless communication
    Zhao, Li-Xin
    Zhao, Cheng-Lin
    Zhou, Zheng
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2005, 28 (06): : 65 - 68
  • [23] On the Host Signal Approximation for Image Data Hiding Scheme Based on Complete Complementary Codes
    Kojima, Tetsuya
    Kato, Kakeru
    2017 EIGHTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS (IWSDA), 2017, : 135 - 139
  • [24] A Disaster Prevention Broadcasting Based on Data Hiding Scheme Using Complete Complementary Codes
    Kojima, Tetsuya
    Tachikawa, Toru
    Oizumi, Akihiro
    Yamaguchi, Yoshimasa
    Parampalli, Udaya
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 45 - 49
  • [25] Attacking digital watermarks
    Sion, R
    Atallah, M
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 848 - 858
  • [26] Attacks on digital watermarks
    Wu, Min
    Liu, Bede
    Conference Record of the Asilomar Conference on Signals, Systems and Computers, 1999, 2 : 1508 - 1512
  • [27] Watermarks and cryptography based model for digital rights management
    Yuan, Zheng
    Wen, Qiao-Yan
    Diao, Jun-Feng
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2006, 29 (05): : 98 - 102
  • [28] Complete complementary codes applied to UTRA FDD asynchronous uplink
    Detert, T
    Haak, WA
    Martoyo, I
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 441 - 444
  • [29] Two-dimensional quasi orthogonal complete complementary codes
    Turcsány, M
    Farkas, P
    SYMPOTIC'03: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2003, : 37 - 40
  • [30] A Novel Class of Complete Complementary Codes and Their Applications for APU Matrices
    Das, Shibsankar
    Majhi, Sudhan
    Liu, Zilong
    IEEE SIGNAL PROCESSING LETTERS, 2018, 25 (09) : 1300 - 1304