Zhong-hai Yin, Xiang Zhou, Da-hua Gao, Yong-jun Zhou, Xin Wang
{"title":"A blind digital watermarking scheme based on frame coding","authors":"Zhong-hai Yin, Xiang Zhou, Da-hua Gao, Yong-jun Zhou, Xin Wang","doi":"10.1109/IASP.2009.5054619","DOIUrl":null,"url":null,"abstract":"A cropping resistant blind digital watermarking scheme based on frame coding is designed. Two technologies, image confusion and frame coding, are used to deal with watermark information, which can enhance information security and bind the synchronous information with a watermark. Meanwhile, in DCT domain, an embedding strategy based on image fragmentation and the extracting strategy based on image location are offered. The experimental results show that this scheme possesses a high robustness under cropping attack. And it can effectively resist normal image disposal methods.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"190 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Image Analysis and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IASP.2009.5054619","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A cropping resistant blind digital watermarking scheme based on frame coding is designed. Two technologies, image confusion and frame coding, are used to deal with watermark information, which can enhance information security and bind the synchronous information with a watermark. Meanwhile, in DCT domain, an embedding strategy based on image fragmentation and the extracting strategy based on image location are offered. The experimental results show that this scheme possesses a high robustness under cropping attack. And it can effectively resist normal image disposal methods.