Advanced Search
Volume 31 Issue 3
Dec.  2010
Turn off MathJax
Article Contents
Ye Tian-yu, Niu Xin-xin, Yang Yi-xian. A Multi-purpose Dual Watermark Algorithm[J]. Journal of Electronics & Information Technology, 2009, 31(3): 546-551. doi: 10.3724/SP.J.1146.2007.01569
Citation: Ye Tian-yu, Niu Xin-xin, Yang Yi-xian. A Multi-purpose Dual Watermark Algorithm[J]. Journal of Electronics & Information Technology, 2009, 31(3): 546-551. doi: 10.3724/SP.J.1146.2007.01569

A Multi-purpose Dual Watermark Algorithm

doi: 10.3724/SP.J.1146.2007.01569
  • Received Date: 2007-09-27
  • Rev Recd Date: 2008-04-03
  • Publish Date: 2009-03-19
  • The single watermark algorithms always merely have single function. In order to overcome the drawback, a multi-purpose dual watermark algorithm is proposed in the paper, taking advantage of the stability of singular values. It divides the original image into several blocks, and inserts robust watermark into their singular values. Then it inserts the fragile watermark into LSB in the space domain of previous watermarked image. Moreover, it designs a rule to distinguish malicious tamper from unintentional tamper. It tests not only robust watermarks robustness towards attacks, but also fragile watermarks influence towards robustness as well as the ability to tamper detection and localization. The experimental results show that the robust watermark possesses strong robustness to resist attacks, and that the fragile watermark is very sensitive to tamper and has good accuracy of tamper localization. Therefore it can achieve copyright protection and content authentication at the same time.
  • loading
  • Lahouari G, Ahmed B, Mohammad K I, and Said B. Digitalimage watermarking using balanced multiwavelets[J].IEEETrans. on Signal Processing.2006, 54(4):1519-1536[2]Yuan H and Zhang X P. Multiscale fragile watermarkingbased on the gaussian mixture model. IEEE Trans. on ImageProcessing, 2006, 15(10): 3189-3200.[3]Schlauweg M, Pr鰂rock D, Palfner T, and M黮ler E.Quantization-based semi-fragile public-key watermarking forsecure image authentication. In Proc. of SPIE, San Diego,California, USA, 2005, 5915: 41-51.[4]Sharkas M, ElShafie D, and Hamdy N. A dual digital-imagewatermarking technique. In Proc. of 3rd World EnformatikaConference (WEC?5), Istanbul, Turkey, 2005: 136-139.[5]刘瑞祯, 谭铁牛. 基于奇异值分解的数字图像水印算法[J]. 电子学报, 2001, 29(2): 168-171.Liu R Z and Tan T N. SVD based digital watermarkingmethod [J]. Acta Electronica Sinica, 2001, 29(2): 168-171.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3214) PDF downloads(981) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return