Skip to main content

Digital Watermarking Scheme Enhancing the Robustness Against Cropping Attack

  • Conference paper
  • First Online:
Frontier Computing (FC 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 464))

Included in the following conference series:

Abstract

Most digital watermarking schemes using QR factorization suffer from being unable to fully utilize the elements of the R matrix. Thus, these schemes are neither secure nor robust to resist the cropping attack. Besides, these schemes do not deal with the allowable modification ranges of the R elements, thereby causing the damage to the hidden watermark. In this paper, we designed an algorithm to redundantly embed the four copies of the watermark bits to enhance the ability to against the cropping attack. During the embedding process, the property of sign wave is employed to ease the modification of real number coefficients. After the four copies of a watermark bit are extracted, they may be different due to possible attacks. Therefore, we designed a weighted strategy to resolve the watermark bit. The experimental results show that our scheme satisfy the requirements of imperceptibility and robustness. Particularly, our scheme has prominent robustness against cropping attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ansari, I.A., Pant, M., Ahn, C.W.: SVD based fragile watermarking scheme for tamper localization and self-recovery. Int. J. Mach. Learn. Cybern. 7(6), 1225–1239 (2015). https://doi.org/10.1007/s13042-015-0455-1

    Article  Google Scholar 

  2. Byun, S.C., Lee, S.K., Tewfik, A.H., Ahn, B.H.: A SVD-based fragile watermarking scheme for image authentication. LNCS, vol. 2613, pp. 170–178. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Cheney, W., Kincaid, D.: Linear Algebra: Theory and Applications. Jones and Bartlett, Sudbury (2009)

    MATH  Google Scholar 

  4. Gao, J., Fan, L., Xu, L.: Solving the face recognition problem using QR factorization. WSEAS Transl. Math. 11(8), 712–721 (2012)

    Google Scholar 

  5. Hsu, C.S., Tu, S.F.: Probability-based tampering detection scheme for digital images. Opt. Commun. 283(9), 1737–1743 (2010)

    Article  Google Scholar 

  6. Hsu, C.S., Tu, S.F.: Image authentication based on QR decomposition and sinusoid. In: 11th International Conference on Computer Science and Education. IEEE Press, pp. 479–482 (2016). https://doi.org/10.1109/iccse.2016.7581627

  7. Huang, H.F.: A fragile watermarking algorithm based on Chaos and QR decomposition. Intl. J. Adv. Comput. Tech. 5(4), 117–124 (2013)

    Google Scholar 

  8. Kang, Q., Li, K., Chen, H.: An SVD-based fragile watermarking scheme with grouped blocks. In: 2nd International Conference on Information Technology and Electronic Commerce. IEEE Press (2014). https://doi.org/10.1109/icitec.2014.7105595

  9. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House Inc., MA, USA (2000)

    Google Scholar 

  10. Stoer, J., Bulirsch, R.: Introduction to Numerical Analysis, 3rd edn. Springer, New York (2002)

    Book  Google Scholar 

  11. Su, O., Niu, Y., Zou, H., Zhao, Y., Yao, T.: A blind double color image watermarking algorithm based on QR decomposition. Multimed. Tools Appl. 72(1), 987–1009 (2014)

    Article  Google Scholar 

  12. Su, Q., Niu, Y., Wang, G., Jia, S., Yue, J.: Color image blind watermarking scheme based on QR decomposition. Signal Proc. 94, 219–235 (2014)

    Article  Google Scholar 

  13. Su, O., Wang, G., Zhang, X., Lv, G., Chen, B.: An improved color image watermarking algorithm based on QR decomposition. Multimed. Tools Appl. 76(1), 707–729 (2017). https://doi.org/10.1007/s11042-015-3071-x

    Article  Google Scholar 

  14. Subhedar, M.S., Manbkar, V.H.: Image steganography using redundant discrete wavelet transform and QR factorization. Comp. Elec. Eng. 54, 406–422 (2016)

    Article  Google Scholar 

  15. QR decomposition. https://en.wikipedia.org/wiki/QR_decomposition

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shu-Fen Tu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hsu, CS., Tu, SF. (2018). Digital Watermarking Scheme Enhancing the Robustness Against Cropping Attack. In: Hung, J., Yen, N., Hui, L. (eds) Frontier Computing. FC 2017. Lecture Notes in Electrical Engineering, vol 464. Springer, Singapore. https://doi.org/10.1007/978-981-10-7398-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7398-4_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7397-7

  • Online ISBN: 978-981-10-7398-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics