{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:37:30Z","timestamp":1755225450886,"version":"3.43.0"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"8","funder":[{"name":"Shanxi Provincial Major Science and Technology Special Project","award":["202301020101001"],"award-info":[{"award-number":["202301020101001"]}]},{"DOI":"10.13039\/501100013317","name":"Shanxi Provincial Key Research and Development Project","doi-asserted-by":"crossref","award":["202302010101004"],"award-info":[{"award-number":["202302010101004"]}],"id":[{"id":"10.13039\/501100013317","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shanxi Provincial Applied Basic Research Program","award":["202203021222093"],"award-info":[{"award-number":["202203021222093"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2025,8,31]]},"abstract":"<jats:p>Spread spectrum watermarking is a robust methodology for image copyright identification. Embedding location and weight are two critical factors that influence watermark performance. As a rule of thumb, direct current (DC) coefficients are generally excluded from embedding the spread spectrum watermark due to the introduction of block artifacts. We investigate into this issue from the view of watermark embedding and reveal the fact that a desired embedding location should have small module and high stability. The DC location, while exhibiting high stability, is constrained by its large module. To address this limitation, we present a method for adjusting the DC coefficients (ADC). First, the discrete cosine transform (DCT) is performed on a matrix comprised of DC coefficients from all blocks of the host image. Second, the coefficients at the end of the high-frequency band, with the smallest module, are selected to form the embedding location. To adapt different real scenes, an attack-based weight (ABW) method is presented. It incorporates prior attack information into the weight determination. Experimental results demonstrate that the performance of the state-of-the-art algorithms is improved using the adjusted embedding location, and the integration of ADC and ABW methods further enhances the performance of the watermark system, which achieves an average PSNR of 48\u2009dB with the bit error ratio (BER) approaching zero.<\/jats:p>","DOI":"10.1145\/3743139","type":"journal-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T12:48:40Z","timestamp":1749214120000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Spread Spectrum Watermark in DC: A View from the Embedding Processing"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2042-6944","authenticated-orcid":false,"given":"Huijuan","family":"Guo","sequence":"first","affiliation":[{"name":"School of Information and Computer, Taiyuan University of Technology, Taiyuan, China and School of Computer Science and Technology, Taiyuan Normal University, Jinzhong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7924-3384","authenticated-orcid":false,"given":"Baoning","family":"Niu","sequence":"additional","affiliation":[{"name":"School of Information and Computer, Taiyuan University of Technology, Taiyuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7554-063X","authenticated-orcid":false,"given":"Ying","family":"Huang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3705-4885","authenticated-orcid":false,"given":"Xuefei","family":"Bai","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Shanxi University, Taiyuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4350-579X","authenticated-orcid":false,"given":"Fangpeng","family":"Lan","sequence":"additional","affiliation":[{"name":"School of Information and Computer, Taiyuan University of Technology, Taiyuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5271-8472","authenticated-orcid":false,"given":"Peng","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Taiyuan Normal University, Jinzhong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,8,13]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.2008222"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357333"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2005.855084"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.850970"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp28-38"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp13-27"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3025660"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3115-2"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2878541"},{"issue":"1","key":"e_1_3_1_12_2","first-page":"1","article-title":"Fajar Agung Nugraha, Bahalwan Apriyansyah, and Mohammed Fakhreldin. 2025. Dual watermarking based on human visual characteristics with IWT-SVD","volume":"13","author":"Fikri Chairul","year":"2025","unstructured":"Chairul Fikri, Fajar Agung Nugraha, Bahalwan Apriyansyah, and Mohammed Fakhreldin. 2025. Dual watermarking based on human visual characteristics with IWT-SVD. International Journal of Advanced Computing and Informatics 13, 1 (2025), 1\u201312.","journal-title":"International Journal of Advanced Computing and Informatics"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/InfoSEEE.2014.6946233"},{"issue":"7","key":"e_1_3_1_14_2","doi-asserted-by":"crossref","first-page":"18829","DOI":"10.1007\/s11042-023-16202-2","article-title":"An attack resistant hybrid blind image watermarking scheme based on combination of DWT, DCT and PCA","volume":"83","author":"Hosseini S. Abolfazl","year":"2024","unstructured":"S. Abolfazl Hosseini and Parya Farahmand. 2024. An attack resistant hybrid blind image watermarking scheme based on combination of DWT, DCT and PCA. Multimedia Tools and Applications 83, 7 (2024), 18829\u201318852.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10202467"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/76.867936"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3245650"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2907475"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503160"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/83.977879"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12916"},{"issue":"1","key":"e_1_3_1_22_2","first-page":"452","article-title":"Optimization-based image watermarking algorithm using maximum-likelihood decoder scheme in the complex wavelet domain","volume":"13","author":"Liu Jinhua","year":"2019","unstructured":"Jinhua Liu and Yunbo Rao. 2019. Optimization-based image watermarking algorithm using maximum-likelihood decoder scheme in the complex wavelet domain. KSII Transactions on Internet and Information Systems 13, 1 (2019), 452\u2013472.","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-017-0607-5"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908226"},{"issue":"1","key":"e_1_3_1_25_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3425605","article-title":"360-degree VR video watermarking based on spherical wavelet transform","volume":"17","author":"Liu Yanwei","year":"2021","unstructured":"Yanwei Liu, Jinxia Liu, Antonios Argyriou, Siwei Ma, Liming Wang, and Zhen Xu. 2021. 360-degree VR video watermarking based on spherical wavelet transform. ACM Transactions on Multimedia Computing, Communications, and Applications 17, 1 (2021), 1\u201323.","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.04.004"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3342612"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3625547"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3492803"},{"key":"e_1_3_1_30_2","unstructured":"University of Southern California. 1997. USC-SIPI Database. Retrieved June 1 2025 from http:\/\/sipi.usc.edu\/services\/database\/index.html"},{"key":"e_1_3_1_31_2","unstructured":"University of Washington. 2004. Ground Truth Database. Retrieved June 1 2025 from http:\/\/imagedatabase.cs.washington.edu\/"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2007.07.020"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2957751"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp39-47"},{"issue":"3","key":"e_1_3_1_35_2","first-page":"1","article-title":"Double expanding robust image watermarking based on spread spectrum technique and BCH coding","volume":"76","author":"Soleymani Seyyed Hossein","year":"2017","unstructured":"Seyyed Hossein Soleymani and Amir Hossein Taherinia. 2017. Double expanding robust image watermarking based on spread spectrum technique and BCH coding. Multimedia Tools & Applications 76, 3 (2017), 1\u201319.","journal-title":"Multimedia Tools & Applications"},{"issue":"3","key":"e_1_3_1_36_2","doi-asserted-by":"crossref","first-page":"1208","DOI":"10.1109\/TCSVT.2020.2998476","article-title":"Robust high-capacity watermarking over online social network shared images","volume":"31","author":"Sun Weiwei","year":"2020","unstructured":"Weiwei Sun, Jiantao Zhou, Yuanman Li, Ming Cheung, and James She. 2020. Robust high-capacity watermarking over online social network shared images. IEEE Transactions on Circuits and Systems for Video Technology 31, 3 (2020), 1208\u20131221.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.132"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3372811"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2199312"},{"issue":"2","key":"e_1_3_1_40_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3652608","article-title":"Invisible adversarial watermarking: A novel security mechanism for enhancing copyright protection","volume":"21","author":"Wang Jinwei","year":"2024","unstructured":"Jinwei Wang, Haihua Wang, Jiawei Zhang, Hao Wu, Xiangyang Luo, and Bin Ma. 2024. Invisible adversarial watermarking: A novel security mechanism for enhancing copyright protection. ACM Transactions on Multimedia Computing, Communications and Applications 21, 2 (2024), 1\u201322.","journal-title":"ACM Transactions on Multimedia Computing, Communications and Applications"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2795745"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3065199"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2146263"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3185089.3185123"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3743139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T12:05:00Z","timestamp":1755086700000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3743139"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,13]]},"references-count":43,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8,31]]}},"alternative-id":["10.1145\/3743139"],"URL":"https:\/\/doi.org\/10.1145\/3743139","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2025,8,13]]},"assertion":[{"value":"2024-12-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}