Ye Tian-yu, Niu Xin-xin, Yang Yi-xian. A Multi-purpose Dual Watermark Algorithm[J]. Journal of Electronics & Information Technology, 2009, 31(3): 546-551. doi: 10.3724/SP.J.1146.2007.01569
Citation:
Ye Tian-yu, Niu Xin-xin, Yang Yi-xian. A Multi-purpose Dual Watermark Algorithm[J]. Journal of Electronics & Information Technology, 2009, 31(3): 546-551. doi: 10.3724/SP.J.1146.2007.01569
Ye Tian-yu, Niu Xin-xin, Yang Yi-xian. A Multi-purpose Dual Watermark Algorithm[J]. Journal of Electronics & Information Technology, 2009, 31(3): 546-551. doi: 10.3724/SP.J.1146.2007.01569
Citation:
Ye Tian-yu, Niu Xin-xin, Yang Yi-xian. A Multi-purpose Dual Watermark Algorithm[J]. Journal of Electronics & Information Technology, 2009, 31(3): 546-551. doi: 10.3724/SP.J.1146.2007.01569
The single watermark algorithms always merely have single function. In order to overcome the drawback, a multi-purpose dual watermark algorithm is proposed in the paper, taking advantage of the stability of singular values. It divides the original image into several blocks, and inserts robust watermark into their singular values. Then it inserts the fragile watermark into LSB in the space domain of previous watermarked image. Moreover, it designs a rule to distinguish malicious tamper from unintentional tamper. It tests not only robust watermarks robustness towards attacks, but also fragile watermarks influence towards robustness as well as the ability to tamper detection and localization. The experimental results show that the robust watermark possesses strong robustness to resist attacks, and that the fragile watermark is very sensitive to tamper and has good accuracy of tamper localization. Therefore it can achieve copyright protection and content authentication at the same time.
Lahouari G, Ahmed B, Mohammad K I, and Said B. Digitalimage watermarking using balanced multiwavelets[J].IEEETrans. on Signal Processing.2006, 54(4):1519-1536[2]Yuan H and Zhang X P. Multiscale fragile watermarkingbased on the gaussian mixture model. IEEE Trans. on ImageProcessing, 2006, 15(10): 3189-3200.[3]Schlauweg M, Pr鰂rock D, Palfner T, and M黮ler E.Quantization-based semi-fragile public-key watermarking forsecure image authentication. In Proc. of SPIE, San Diego,California, USA, 2005, 5915: 41-51.[4]Sharkas M, ElShafie D, and Hamdy N. A dual digital-imagewatermarking technique. In Proc. of 3rd World EnformatikaConference (WEC?5), Istanbul, Turkey, 2005: 136-139.[5]刘瑞祯, 谭铁牛. 基于奇异值分解的数字图像水印算法[J]. 电子学报, 2001, 29(2): 168-171.Liu R Z and Tan T N. SVD based digital watermarkingmethod [J]. Acta Electronica Sinica, 2001, 29(2): 168-171.