Journal of Applied Mathematics

  • J. Appl. Math.
  • Volume 2013, Special Issue (2013), Article ID 632043, 8 pages.

An Extended DCT Domain Watermarking for Robot Vision against Geometric Image Attacks

Okkyung Choi, InBae Jeon, Seung-Wha Yoo, and Seungbin Moon

Full-text: Open access


With the rapid development of the Internet and the mobile service robot, the digital services are becoming important factors for robots to recognize things in the real world. Advances in computer technology and the risk of copyright infringement have increased in the way that anyone replicates and copies digital media easily. Therefore, ways to prevent and suppress copyright infringement, digital watermarking technologies that insert copyrights information into the work, are being researched. Digital watermark, depending on the actual insert domain, can be categorized into the spatial domain and transform domain. In this paper, we propose an extended DCT domain watermarking for robot vision. The suggested method is by distributing and duplicating watermark images that are including copyright information on the original images. By doing this, it can be strong on geometric image attacks such as partial cutting, resizing, rotating, and so forth. For the success of watermark extraction, invertible process can be used to recover a disfigured image. Experimental results are provided to support these methods, through the process of recombination by complete image pieces.

Article information

J. Appl. Math., Volume 2013, Special Issue (2013), Article ID 632043, 8 pages.

First available in Project Euclid: 14 March 2014

Permanent link to this document

Digital Object Identifier


Choi, Okkyung; Jeon, InBae; Yoo, Seung-Wha; Moon, Seungbin. An Extended DCT Domain Watermarking for Robot Vision against Geometric Image Attacks. J. Appl. Math. 2013, Special Issue (2013), Article ID 632043, 8 pages. doi:10.1155/2013/632043.

Export citation


  • J. Jo, H. Kang, H. Kim, and S. Kim, Multimedia Signal Processing: Fundamentals and Practice, Sayitek Media, Seoul, Republic of Korea, 2nd edition, 2011.
  • S.-W. Han, DCT based watermarking using block indexing [M.S. thesis], Department of Computer Science, Pukyong National University, 2005.
  • D. Lee, DCT Zerotree-based digital watermarking using modification of threshold and embedding level [M.S. thesis], Inhwa University, 2005.
  • W. R. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” in Storage and Retrieval for Image and Video Databases III, vol. 2420 of Proceeding of the SPIE, pp. 164–173, February 1995.
  • I. Pitas and T. H. Kaskalis, “Applying signatures on digital images,” in Proceedings of the IEEE Workshop on Nonlinear Signal and Image Processing, pp. 460–463, Neos Marmaras, Greece, June 1995.
  • J. J. K. O. Ruanaidch, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” IEE Proceedings–-Vision, Image and Signal Processing, vol. 143, no. 4, pp. 250–256, 1996.
  • E. Koch and J. Zhao, “Towards robust and hidden image copyright labeling,” in Proceedings of the IEEE Workshop on Nonlinear Signal and Image Processing, pp. 452–455, Halkidiki, Greece, June 1995.
  • I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997.
  • S. Al-Mansoori and A. Kunhu, “Robust watermarking technique based on DCT to protect the ownership of DubaiSat-1 images against attacks,” International Journal of Computer Science and Network Security, vol. 12, no. 6, pp. 1–9, 2012.
  • J. Bang, Binary watermark image in the DCT domain watermarking method for insertion [M.S. thesis], Chunnam University, 2003.
  • S. Jung and M. Lee, “Pure java based image processing with imageGS API,” JungIkSa, Seoul, Republic of Korea, 2005.
  • W. Choi, A DCT based fragile watermarking for JPEG image authentication [M.S. thesis], Sejong University, 2011.
  • J. Mei, S. Li, and X. Tan, “A digital watermarking algorithm based on DCT and DWT,” in Proceedings of the International Symposium on Web Information Systems and Applications (WISA '09), pp. 104–107, 2009. \endinput