IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2006-02-21 10:40
An Image Based Data Hiding by a Key in Karhunen Loeve Space
Takeshi Yamamoto, Mitsugu Kakuta, Yukio Kosugi (Tokyo Inst. of Tech.)
Abstract (in Japanese) (See Japanese page) 
(in English) A digital watermark is useful technology as a method to embed kind of key information for proof to digital contents. The digital watermark (KL watermark) for the image based on Karhunen Loeve transformation that we have proposed is an embedding method by application of the basis of an image. The method has confirmed that it has tolerance to JPEG compression and composite transformation. Moreover, it has a feature that an embedded watermark information can be taken out in the hand from received the embedding image. However, this feature is also the subject that the taken-out watermark will be used for another contents image. To such a subject, in the previous work , KL watermarking by low embedding intensity (dumping factor) was studied. Generally, by the digital watermarking, if a dumping factor becomes large, decoding accuracy will improve. Since there is such character, the embedding which enlarged the dumping factor in the range that can permit degradation of embedding quality of image is general approach. In the embedding by KL watermark such a tendency is also the same. In the previous study, in order to make it difficult to watermark divert, disorder of a data structure of embedding image is applied. Such disorder effect occurs in an embedding image, after an embedding image passes a multimedia communication system. Moreover, it was shown that separation with a cover image and a watermark becomes difficult in decoding by such embedding. In this paper, an image authentication based on KL watermark is proposed. First, by proposed method, encryption of a watermark is performed in embedding. In decoding, a watermark can be extracted only by performing decoding using a threshold value. Next, it is shown that decoding from the image by the proposed method is performed with the open algorithm of decoding, while this paper shows that decoding from the image embedded by conventional method is not performed.
Keyword (in Japanese) (See Japanese page) 
(in English) Karhunen Loeve Transform / Watermarking / Multimedia Communication / Data Structure / Open Algorithm / / /  
Reference Info. IEICE Tech. Rep., vol. 105, no. 609(ITS), 611(IE), ITS2005-83, IE2005-290, pp. 23-28, Feb. 2006.
Paper #  
Date of Issue 2006-02-14 (ITS, IE) 
ISSN Print edition: ISSN 0913-5685  Online edition: ISSN 2432-6380
Download PDF

Conference Information
Committee ITS IE ITE-ME ITE-AIT ITE-HI  
Conference Date 2006-02-20 - 2006-02-21 
Place (in Japanese) (See Japanese page) 
Place (in English) Hokkaido Univ. 
Topics (in Japanese) (See Japanese page) 
Topics (in English) Image Processing for ITS, etc. 
Paper Information
Registration To ITE-ME 
Conference Code 2006-02-ITS-IE-ITE-ME-ITE-CG-ITE-HI 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) An Image Based Data Hiding by a Key in Karhunen Loeve Space 
Sub Title (in English)  
Keyword(1) Karhunen Loeve Transform  
Keyword(2) Watermarking  
Keyword(3) Multimedia Communication  
Keyword(4) Data Structure  
Keyword(5) Open Algorithm  
Keyword(6)  
Keyword(7)  
Keyword(8)  
1st Author's Name Takeshi Yamamoto  
1st Author's Affiliation Tokyo Institute of Technology (Tokyo Inst. of Tech.)
2nd Author's Name Mitsugu Kakuta  
2nd Author's Affiliation Tokyo Institute of Technology (Tokyo Inst. of Tech.)
3rd Author's Name Yukio Kosugi  
3rd Author's Affiliation Tokyo Institute of Technology (Tokyo Inst. of Tech.)
4th Author's Name  
4th Author's Affiliation ()
5th Author's Name  
5th Author's Affiliation ()
6th Author's Name  
6th Author's Affiliation ()
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Speaker
Date Time 2006-02-21 10:40:00 
Presentation Time 25 
Registration for ITE-ME 
Paper # IEICE-ITS2005-83,IEICE-IE2005-290 
Volume (vol) IEICE-105 
Number (no) no.609(ITS), no.611(IE) 
Page pp.23-28 
#Pages IEICE-6 
Date of Issue IEICE-ITS-2006-02-14,IEICE-IE-2006-02-14 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan