Highly robust image watermarking using complementary modulations

Chun Shien Lu, Hong Yuan Mark Liao, Shih-Kun Huang, Chwen Jye Sze

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

In this paper, a novel image protection scheme using “complementary modulations” is proposed. In order to satisfy the robustness requirement, two watermarks are embedded into a host image to play complementary roles so that at least one watermark survives any attack. Statistical analysis is conducted to derive the lower bound of the worst likelihood that the better watermark (of the two) can be extracted. With this “high” lower bound, it is ensured that a “better” extracted watermark is always obtained. Experimental results demonstrate that our watermarking scheme is remarkably effective in resisting various attacks.

Original languageEnglish
Title of host publicationInformation Security - 2nd International Workshop, ISW 1999, Proceedings
EditorsMasahiro Mambo, Yuliang Zheng
PublisherSpringer Verlag
Pages136-153
Number of pages18
ISBN (Print)3540666958, 9783540666950
DOIs
StatePublished - 1 Jan 1999
Event2nd International Information Security Workshop, ISW 1999 - Kuala Lumpur, Malaysia
Duration: 6 Nov 19997 Nov 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1729
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Information Security Workshop, ISW 1999
CountryMalaysia
CityKuala Lumpur
Period6/11/997/11/99

Fingerprint Dive into the research topics of 'Highly robust image watermarking using complementary modulations'. Together they form a unique fingerprint.

  • Cite this

    Lu, C. S., Liao, H. Y. M., Huang, S-K., & Sze, C. J. (1999). Highly robust image watermarking using complementary modulations. In M. Mambo, & Y. Zheng (Eds.), Information Security - 2nd International Workshop, ISW 1999, Proceedings (pp. 136-153). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1729). Springer Verlag. https://doi.org/10.1007/3-540-47790-X_12