Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2006, Vol. 7 Issue (3): 285-288    DOI: 10.1631/jzus.2006.A0285
Computer & Information Science     
A new asymmetric watermarking scheme based on a real fractional DCT-I transform
Gui Guo-fu, Jiang Ling-ge, He Chen
Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  A new asymmetric watermarking scheme is proposed in this letter. In the proposed scheme, a secret real fractional DCT-I transform and a primitive watermark are employed to generate an asymmetric watermark. The secret watermark for embedding is derived from the primitive watermark, and is embedded in the large fractional DCT-I transformation coefficients of a cover signal. The asymmetric detection procedure is performed using a correlation test. Simulation results showed that the asymmetric detection is reliable, and that the scheme can provide minimum security.

Key wordsAsymmetric watermarking      DCT-I      Fractional transforms     
Received: 25 August 2005     
CLC:  TP309  
Cite this article:

Gui Guo-fu, Jiang Ling-ge, He Chen. A new asymmetric watermarking scheme based on a real fractional DCT-I transform. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(3): 285-288.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2006.A0285     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2006/V7/I3/285

[1] Jenn-Shyong HORNG, I-Chang JOU, Chiou-Yng LEE. Low-complexity multiplexer-based normal basis multiplier over GF(2m)[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(6): 834-842.
[2] Tzong-sun WU, Chien-lung HSU, Han-yu LIN. Self-certified multi-proxy signature schemes with message recovery[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 290-300.
[3] Tamara PAZYNYUK, Jian-zhong LI, George S. OREKU. Improved Feistel-based ciphers for wireless sensor network security[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1111-1117.
[4] Cheng-qing LI, Dan ZHANG, Guan-rong CHEN. Cryptanalysis of an image encryption scheme based on the Hill cipher[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1118-1123.
[5] Chang-da WANG, Shi-guang JU. Integrated criteria for covert channel auditing[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 737-743.
[6] Ning CHEN, Jie ZHU. Multipurpose audio watermarking algorithm[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(4): 517-523.
[7] Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ. Comments on “How to repair the Hill cipher”[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 211-214.
[8] ZENG Yong-hong, ZOU Xue-cheng, LIU Zheng-lin, LEI Jian-ming. A low-power Rijndael S-Box based on pass transmission gate and composite field arithmetic[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(10): 1553-1559.
[9] LEE Kok-wah, EWE Hong-tat. Multiple hashes of single key with passcode for multiple accounts[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(8): 1183-1190.
[10] KULESZA Kamil, KOTULSKI Zbigniew. On ASGS framework: general requirements and an example of implementation[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4 ): 1-.
[11] Ru Xue-min, Zhuang Yue-ting, Wu Fei. Audio steganalysis based on “negative resonance phenomenon” caused by steganographic tools[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(4 ): 15-.
[12] GUO Xing-yang, TANG Chao-jing. Colluding attacks on a group signature scheme[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6(10): 1-.
[13] XIE Qi, YU Xiu-yuan. A novel group signature with one time secret key[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6(6): 560-564.
[14] JIN Jian-qiu, DAI Min-ya, BAO Hu-jun, PENG Qun-sheng. Watermarking on 3D mesh based on spherical wavelet transform[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(3): 251-258.
[15] HUANG Zheng, CHEN Ke-fei, KOU Wei-dong. Untraceable partially blind signature based on DLOG problem[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(1): 40-44.