{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:08:59Z","timestamp":1749874139481,"version":"3.41.0"},"reference-count":27,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2017]]},"DOI":"10.1587\/transinf.2016mup0003","type":"journal-article","created":{"date-parts":[[2016,12,31]],"date-time":"2016-12-31T22:21:55Z","timestamp":1483222915000},"page":"13-23","source":"Crossref","is-referenced-by-count":6,"title":["Image Watermarking Method Satisfying IHC by Using PEG LDPC Code"],"prefix":"10.1587","volume":"E100.D","author":[{"given":"Nobuhiro","family":"HIRATA","sequence":"first","affiliation":[{"name":"Graduate School of Science and Engineering, Yamaguchi University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takayuki","family":"NOZAKI","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Engineering, Yamaguchi University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Masaki","family":"KAWAMURA","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Engineering, Yamaguchi University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] StirMark benchmark (Ver.4.0), http:\/\/www.petitcolas.net\/fabien\/watermarking\/stirmark\/, accessed March 25, 2016."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, \u201cAttacks on copyright marking systems,\u201d Information Hiding, Lecture Notes in Computer Science, vol.1525, pp.218-238, Springer-Verlag, 1998.","DOI":"10.1007\/3-540-49380-8_16"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] F.A.P. Petitcolas, \u201cWatermarking schemes evaluation,\u201d IEEE Signal Process. Mag., vol.17, no.5, pp.58-64, 2000.","DOI":"10.1109\/79.879339"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] T. Yamamoto and M. Kawamura, \u201cMethod of spread spectrum watermarking using quantization index modulation for cropped images,\u201d IEICE Trans. Information and Systems, vol.E98-D, no.7, pp.1306-1315, 2015.","DOI":"10.1587\/transinf.2014EDP7390"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] K. Solanki, N. Jacobsen, U. Madhow, B.S. Manjunath, and S. Chandrasekaran, \u201cRobust image-adaptive data hiding using erasure and error correction,\u201d IEEE Trans. Image Process., vol.13, no.12, pp.1627-1639, 2004.","DOI":"10.1109\/TIP.2004.837557"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] X. Kang, J. Huang, Y.Q. Shi, and Y. Lin, \u201cA DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.13, no.8, pp.776-786, 2003.","DOI":"10.1109\/TCSVT.2003.815957"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] M. Cancellaro, F. Battisti, M. Carli, G. Boato, F.G.B. De Natale, and A. Neri, \u201cA commutative digital image watermarking and encryption method in the tree structured Haar transform domain,\u201d Signal Processing: Image Communication, vol.26, no.1, pp.1-12, 2011.","DOI":"10.1016\/j.image.2010.11.001"},{"key":"8","unstructured":"[8] Information hiding and its criteria for evaluation, IEICE, http:\/\/www.ieice.org\/iss\/emm\/ihc\/en\/, accessed March 25, 2016."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] Z. Wang, A.C. Bovik, H.R. Sheikh, and E.P. Simoncelli, \u201cImage quality assessment: from error visibility to structural similarity,\u201d IEEE Trans. Image Processing, vol.13, no.4, pp.600-612, 2004.","DOI":"10.1109\/TIP.2003.819861"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, \u201cSecure spread spectrum watermarking for multimedia,&apos; IEEE Trans. Image Process., vol.6, no.12, pp.1673-1687, 1997.","DOI":"10.1109\/83.650120"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] I. Usman and A. Khan, \u201cBCH coding and intelligent watermark embedding: Employing both frequency and strength selection,\u201d Applied Soft Computing Journal, vol.10, no.1, pp.332-343, 2010.","DOI":"10.1016\/j.asoc.2009.08.004"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] N. Hirata and M. Kawamura, \u201cDigital watermarking method using LDPC code for clipped image,\u201d Proc. 1st Inter. Workshop on Information Hiding and its Criteria for Evaluation (IWIHC2014), Kyoto, pp.25-30, 2014.","DOI":"10.1145\/2598908.2598913"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] N. Hirata and M. Kawamura, \u201cWatermarking method using concatenated code for scaling and rotation attacks,\u201d Proc. 14th Inter. Workshop on Digital-forensics and Watermarking (IWDW2015), LNCS, vol.9569, pp.259-270, Springer-Verlag, 2016.","DOI":"10.1007\/978-3-319-31960-5_22"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] H. Ogawa, M. Kuribayashi, M. Iwata, and K. Kise, \u201cDCT-OFDM based watermarking scheme robust against clipping, rotation, and scaling attacks,\u201d Proc. 14th Inter. Workshop on Digital-forensics and Watermarking (IWDW2015), LNCS, vol.9569, pp.271-284, Springer-Verlag, 2016.","DOI":"10.1007\/978-3-319-31960-5_23"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] I. Nasir, F. Khelifi, J. Jiang, and S. Ipson, \u201cRobust image watermarking via geometrically invariant feature points and image normalisation,\u201d IET Image Processing, vol.6, no.4, pp.354-363, 2012.","DOI":"10.1049\/iet-ipr.2010.0421"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] Y. Jiang, Y. Zhang, W. Pei, and K. Wang, \u201cAdaptive spread transform QIM watermarking algorithm based on improved perceptual models,\u201d AEU-International Journal of Electronics and Communications, vol.67, no.8, pp.690-696, 2013.","DOI":"10.1016\/j.aeue.2013.02.005"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] L.P. Feng, L.B. Zheng, and P. Cao, \u201cA DWT-DCT based blind watermarking algorithm for copyright protection,\u201d 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), vol.7, pp.455-458, 2010.","DOI":"10.1109\/ICCSIT.2010.5565101"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] N. Kashyap and G.R. Sinha, \u201cImage watermarking using 3-level discrete wavelet transform (DWT),\u201d International Journal of Modern Education and Computer Science, vol.4, no.3, pp.50-56, 2012.","DOI":"10.5815\/ijmecs.2012.03.07"},{"key":"19","unstructured":"[19] G.D. Forney, Jr., Concatenated Codes, MIT Press, Cambridge, MA, 1966."},{"key":"20","unstructured":"[20] ETSI EN 302 755, V1.3.1, Digital Video Broadcasting (DVB); Frame structure channel coding and modulation for a second generation digital terrestrial television broadcasting system, 2012."},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] R.G. Gallager, \u201cLow-density parity-check codes,\u201d IRE Trans. Information Theory, vol.8, no.1, pp.21-28, 1962.","DOI":"10.1109\/TIT.1962.1057683"},{"key":"22","unstructured":"[22] T. Wadayama, \u201cA coded modulation scheme based on low density parity check codes,\u201d IEICE Trans. Fundamentals, vol.E84-A, no.10, pp.2523-2527, Oct. 2001."},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] D.J.C. MacKay, \u201cGood error-correcting codes based on very sparse matrices,\u201d IEEE Trans. Inform. Theory, vol.45, no.2, pp.399-431, 1999.","DOI":"10.1109\/18.748992"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] X.-Y. Hu, E. Eleftheriou, and D.M. Arnold, \u201cRegular and irregular progressive edge-growth Tanner graphs,\u201d IEEE Trans. Inform. Theory, vol.51, no.1, pp.386-398, 2005.","DOI":"10.1109\/TIT.2004.839541"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] T. Tian, C.R. Jones, J.D. Villasenor, and R.D. Wesel, \u201cSelective avoidance of cycles in irregular LDPC code construction,\u201d IEEE Trans. Commun., vol.52, no.8, pp.1242-1247, 2004.","DOI":"10.1109\/TCOMM.2004.833048"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] X. He, L. Zhou, J. Du, and Z. Shi, \u201cThe multi-step PEG and ACE constrained PEG algorithms can design the LDPC codes with better cycle-connectivity,\u201d IEEE International Symposium on Inform. Theory, pp.46-50, 2015.","DOI":"10.1109\/ISIT.2015.7282414"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] B. Chen and G.W. Wornell, \u201cQuantization index modulation: A class of provably good methods for digital watermarking and information embedding,\u201d IEEE Trans. Inform. Theory, vol.47, no.4, pp.1423-1443, 2001.","DOI":"10.1109\/18.923725"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/1\/E100.D_2016MUP0003\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T23:42:58Z","timestamp":1749858178000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/1\/E100.D_2016MUP0003\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2016mup0003","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"type":"print","value":"0916-8532"},{"type":"electronic","value":"1745-1361"}],"subject":[],"published":{"date-parts":[[2017]]}}}