Advanced Search
Volume 24 Issue 10
Oct.  2002
Turn off MathJax
Article Contents
Zhou Yaxun, Yie Qingwei, Xu Tiefeng. The study of embedding an invisible signature watermarking in a digital image[J]. Journal of Electronics & Information Technology, 2002, 24(10): 1321-1328.
Citation: Zhou Yaxun, Yie Qingwei, Xu Tiefeng. The study of embedding an invisible signature watermarking in a digital image[J]. Journal of Electronics & Information Technology, 2002, 24(10): 1321-1328.

The study of embedding an invisible signature watermarking in a digital image

  • Received Date: 2000-10-30
  • Rev Recd Date: 2001-03-20
  • Publish Date: 2002-10-19
  • As an effective method to provide copyright protection for digital media, digital watermarking has drawn extensive attention recently. By inserting the signature watermarking DCT coefficients into some middle-high frequency range DCT coefficients of the original image, the paper proposes a watermarking scheme of embedding an invisible signature in a digital image based on the combination of wavelet transform and cosine transform. The experimental results demonstrate the robustness and invisibility of digital image watermarking, and the signature watermark can be reliably and explicitly detected even though the watermarked image being degraded by commonly used image processing techniques.
  • loading
  • F. Hartung, B. Girod, Digital watermarking of raw and compressed video, SPIE, 2952, 1996,205-213.[2]B.M. Macq, J. I. Quisquater, Cryptology for digital TV broadcasting, Proc. IEEE, 1995, 83(6),944-957.[3]G. Voyatzis, I. Pitas, The use of watermarks in the protection of digital multimedia products,Proc. IEEE, 1999, 87(7), 1197-1207.[4]R.G. Van Schyndel, A. Z. Tirkel, C. F. Osborne, A digital watermarks, In.[J].IEEE Int. Conf. on Image Processing, Piscataway, New Jersey.1994,2:86-90[5]D.J. Fleet, Embedding invisible information in color images, In: IEEE Int. Conf. on Image Processing, Piscataway, New Jersey, 1997, 1, 532-535.[6]I.J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, 1997, IP-6(12), 1673-1687.[7]M.D. Swanson, M. Kobayashi, A. H. Tewfik, Multiresolution data embedding and watermarking technologies, Proc. IEEE, 1998, 86(6), 1064-1087.[8]钮心忻,杨义先,基于小波变换的数字水印隐藏与检测算法,计算机学报,2000,23(1),21-27.[9]M. Barni, F. Bartolini, V. Cappellini, A. Piva, A DCT-domain system for robust image watermarking, Signal Processing, 1998, 66(3), 357-372.[10]A. Piva, M. Barni, F. Bartolini, V. Cappellini, DCT-based watermark recovering without resorting to the uncorrupted original image, In: IEEE Int. Conf. on Image Processing, Santa Barbra,California, 1997, 1, 520-523.[11]李华,朱光喜,朱耀庭,一种基于人眼视觉感知模型的数字水印隐藏方法,电子学报,2000,28(10),111-114.[12]J. Johnston, N. Jayant, R. Safranek, Signal compression based on models of human perception,Proc. IEEE, 1993, 81(10), 518-526.[13]L. Torres, M. Kunt, Video Coding, The Second Generation Approach, Boston Hardbound, Kluwer Academic Publishers, 1995, 57-102.[14]S. Mallat, A theory of multiresolution signal decomposition: The wavelet representation, IEEE Trans. on PAMI, 1989, 11(7), 674-693.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2149) PDF downloads(687) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return