{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:13:51Z","timestamp":1760242431619,"version":"build-2065373602"},"reference-count":41,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T00:00:00Z","timestamp":1499817600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inversion, contrast manipulation, and compression. The proposed technique is made further robust by the incorporation of the Chinese remainder theorem (CRT) encryption technique. Our scheme is compared with the recently proposed CRT-based DCT technique, CRT-based spatial domain watermarking, and DCT-based inter block correlation techniques. Extensive simulation experiments show better robustness in common image manipulations and, at the same time, the proposed technique successfully makes the watermark perceptually invisible. A better Tamper Assessment Function (TAF) value of 2\u201315% and a better Normalized Correlation (NC) is achieved compared to some of the above techniques. In particular, the proposed technique shows better robustness on compression attacks at moderate to higher compression ratios. It is possible to maintain the imperceptibility and low TAF for various values by doubling the capacity of the watermark.<\/jats:p>","DOI":"10.3390\/fi9030033","type":"journal-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T10:31:57Z","timestamp":1499941917000},"page":"33","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Robust Image Embedded Watermarking Using DCT and Listless SPIHT"],"prefix":"10.3390","volume":"9","author":[{"given":"J.","family":"Shivani","sequence":"first","affiliation":[{"name":"Department of ECE, K L University, Vaddeswaram, Guntur dist, Andhra Pradesh 522502, India"}]},{"given":"Ranjan","family":"Senapati","sequence":"additional","affiliation":[{"name":"Department of ECE, K L University, Vaddeswaram, Guntur dist, Andhra Pradesh 522502, India"}]}],"member":"1968","published-online":{"date-parts":[[2017,7,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/5.982406","article-title":"Invisibility and application functionalities in perceptual watermarking an overview","volume":"90","author":"Vleeschouwer","year":"2002","journal-title":"Proc. IEEE"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","article-title":"Robust image watermarking in the spatial domain","volume":"66","author":"Nikolaidis","year":"1997","journal-title":"Signal Process."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Trans. Image Process."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1530","DOI":"10.1016\/j.patcog.2006.02.009","article-title":"Owner\u2014Customer right protection mechanism using a watermarking scheme and a watermarking protocol","volume":"39","author":"Chen","year":"2006","journal-title":"Pattern Recognit."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","article-title":"A robust image authentication method distinguishing JPEG compression from malicious manipulation","volume":"11","author":"Lin","year":"2001","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden digital watermarks in images","volume":"8","author":"Hsu","year":"1999","journal-title":"IEEE Trans. Image Process."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","article-title":"A DCT-domain system for robust image watermarking","volume":"66","author":"Barni","year":"1977","journal-title":"Signal Process."},{"key":"ref_8","unstructured":"Mohanty, S.P., Ranganathan, N., and Namballa, R.K. (2003, January 27\u201329). VLSI implementation of invisible digital watermarking algorithms towards the development of a secure JPEG encoder. Proceedings of the IEEE Workshop on Signal Processing Systems, Seoul, Korea."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Lu, Z.M., Zheng, H.Y., and Huang, J. (2007, January 26\u201328). A digital watermarking scheme based on DCT and SVD. Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan.","DOI":"10.1109\/IIH-MSP.2007.13"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.sigpro.2007.07.020","article-title":"Human visual system based adaptive digital image watermarking","volume":"88","author":"Qi","year":"2007","journal-title":"Signal Process."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.aeue.2008.11.006","article-title":"Wavelet-based watermarking for color images through visual masking","volume":"64","author":"Liu","year":"2010","journal-title":"AEU Int. J. Electron. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1016\/j.dsp.2007.10.004","article-title":"A simple ICA-based watermarking scheme","volume":"18","author":"Nguyen","year":"2008","journal-title":"Digital Signal Process."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3740","DOI":"10.1016\/j.patcog.2007.05.004","article-title":"Circularly orthogonal moments for geometrically robust image watermarking","volume":"40","author":"Xin","year":"2007","journal-title":"Pattern Recognit."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/j.dsp.2004.08.002","article-title":"Applications of the naturalness preserving transform to image watermarking and data hiding","volume":"14","author":"Ahmed","year":"2004","journal-title":"Digit. Signal Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.sigpro.2009.02.005","article-title":"A local Tchebichef moments-based robust image watermarking","volume":"89","author":"Deng","year":"2009","journal-title":"Signal Process."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","article-title":"An SVD-based watermarking scheme for protecting rightful ownership","volume":"4","author":"Liu","year":"2002","journal-title":"IEEE Trans. Multimed."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2158","DOI":"10.1016\/j.sigpro.2008.02.015","article-title":"An improved SVD-based watermarking scheme for protecting rightful ownership","volume":"88","author":"Mohammad","year":"2008","journal-title":"Signal Process."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.csi.2005.03.006","article-title":"A semi-blind digital watermarking scheme based on singular value decomposition","volume":"28","author":"Shieh","year":"2006","journal-title":"Comput. Stand. Interface"},{"key":"ref_19","unstructured":"Lee, S., Jang, D., and Yoo, C.D. (2005, January 22\u201327). An SVD-based watermarking method for image content authentication with improved security. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Philadelphia, PA, USA."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.amc.2006.09.117","article-title":"On SVD-based watermarking algorithm","volume":"188","author":"Chung","year":"2007","journal-title":"Appl. Math. Comput."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","article-title":"SVD-based digital image watermarking scheme","volume":"26","author":"Chang","year":"2005","journal-title":"Pattern Recognit. Lett."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Patra, J.C., Soh, W., Ang, E.L., and Meher, P.K. (2006, January 4\u20137). An improved SVD-based watermarking technique for image and document authentication. Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, Singapore.","DOI":"10.1109\/APCCAS.2006.342276"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1109\/TCSVT.2009.2035842","article-title":"A robust image watermarking in the Ridgelet domain using universally optimum decoder","volume":"20","author":"Kalantari","year":"2010","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1016\/j.aeue.2011.09.001","article-title":"A robust spread spectrum based image watermarking in ridgelet domain","volume":"66","author":"Sadreazami","year":"2002","journal-title":"AEU Int. J. Electron. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.dsp.2010.03.010","article-title":"A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression","volume":"20","author":"Patra","year":"2010","journal-title":"Digital Signal Process."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/j.dsp.2009.07.004","article-title":"A novel CRT based watermarking techniques for authentication of multimedia content","volume":"20","author":"Patra","year":"2010","journal-title":"Digital Signal Process."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1640","DOI":"10.1109\/TIM.2003.817155","article-title":"Digital watermarking-based DCT and JPEG model","volume":"52","author":"Suhail","year":"2003","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1016\/j.aeue.2012.04.004","article-title":"A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion","volume":"66","author":"Rawat","year":"2012","journal-title":"AEU Int. J. Electron. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.compeleceng.2008.06.002","article-title":"Hardware assisted watermarking for multimedia","volume":"35","author":"Kougianos","year":"2009","journal-title":"Comp. Electr. Eng."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1109\/31.92893","article-title":"VLSI implementation of a 16\u00d716 discrete cosine transform","volume":"36","author":"Sun","year":"1989","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1109\/4.126536","article-title":"A 100 MHz 2-D discrete cosine transform core processor","volume":"27","author":"Uramoto","year":"1992","journal-title":"J. Solid-State Circuits"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1109\/81.250161","article-title":"On the realization of discrete cosine transform using distributed arithmetic","volume":"39","author":"Chan","year":"1992","journal-title":"IEEE Trans. Circuits Syst. I: Fundam. Theory Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/30.391354","article-title":"A low ROM distributed arithmetic implementation of the forward\/inverse DCT\/DST using rotations","volume":"41","author":"Karthanasis","year":"1995","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/76.486423","article-title":"VLSI design of high-speed time recursive 2-D DCT\/IDCT processor for video applications","volume":"6","author":"Srinivasan","year":"1996","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/76.499834","article-title":"A new fast and efficient image codec based on set partitioning in hierarchical trees","volume":"6","author":"Said","year":"1996","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_36","unstructured":"Wheeler, F., and Pearlman, W.A. (2000, January 5\u20139). SPIHT image compression without lists. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Istanbul, Turkey."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1109\/TCSVT.2004.835150","article-title":"Efficient, low complexity image coding with set partitioning embedded block coder","volume":"6","author":"Pearlman","year":"2004","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1049\/iet-ipr.2012.0295","article-title":"Reduced memory, low complexity embedded image compression algorithm using hierarchical listless DTT","volume":"8","author":"Senapati","year":"2014","journal-title":"IET Image Process."},{"key":"ref_39","unstructured":"Engedy, M., Munaga, V.N.K., and Saxena, A. (2006, January 6\u20138). A robust wavelet based digital watermarking scheme using chaotic mixing. Proceedings of the First International Conference on Digital Information Management, Bangalore, India."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.aeue.2013.08.018","article-title":"A Novel blind robust image watermarking in DCT domain using inter-block coefficient correlation","volume":"68","author":"Das","year":"2014","journal-title":"AEU Int. J. Electron. Commun."},{"key":"ref_41","unstructured":"Chang, C.C., Hsiao, J.Y., and Chiang, C.L. (2002, January 6\u20138). An image copyright protection scheme based on torus automorphosim. Proceedings of the First International Symposium on Cyber Worlds, Tokyo, Japan."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/9\/3\/33\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:42:29Z","timestamp":1760208149000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/9\/3\/33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,12]]},"references-count":41,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,9]]}},"alternative-id":["fi9030033"],"URL":"https:\/\/doi.org\/10.3390\/fi9030033","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2017,7,12]]}}}