A Watermarking of Two Dimensions Based on DCT

Article Preview

Abstract:

A watermark algorithm based on HVS in DCT domain is proposed. The original host image is scrambled with magic transform and divided into blocks and manipulates by DCT. The original image’s DCT coefficients can equably distribute in the coefficients matrix. The binary image is divided into 2×2 blocks before embedding the watermarking. Those blocks are random sequenced by the pseudorandom sequence, and then the watermarking image is scrambled by Arnold. The theory of HVS is used to decide the embedding strength under low distortion, which efficiently enhances the robustness of watermarking. The two basic factors of watermarking are robustness and invisibility. The key techniques which affect them are the means we choose to carry out digital watermarking and the watermarking structure we use.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2901-2905

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Cox I J, KILLIAN J, LEIGHTON F T, al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans Image Processing.1997,6 (12):1673-1687.

DOI: 10.1109/83.650120

Google Scholar

[2] Huang Jiwu, Shi Yung, Shi Yi, embedding image watermarks in DC componets, IEEE Tans. On CSVT,2000,10(6):974-979.

DOI: 10.1109/76.867936

Google Scholar

[3] Yang Yanqiu, Cao Longhan, Li jianyong. A Novel Information Security Sense Method Based on Non-parameter Detecting [J]. Gyroscopy and Navigation, 2007(8), №8(28), 580-584.

Google Scholar

[4] Ding Wei, QiDong-Xu. Digital image transformation and information hiding and disguising technology. Chinese Journal of Computer, 1998,21(9):838-84)

Google Scholar

[5] Wu Min-Sheng, Wang Jie-Sheng, Liu Shen-Quan. Permutation transformation of image. Chinese Journal of Computer,1998,21(6):514-5193(in Chinese)

Google Scholar

[6] Yanqiu Yang, Jianyong Li, Changxiu Cao. Audio information hiding algorithm using sample dots inversion and BP network. Journsl of Huazhong University of Science and Technology(Natural Science Edition), 2009(12):13-15(in Chinese).

Google Scholar

[7] Yanqiu Yang, Jianyong Li, Changxiu Cao. A spectrum steganalysis algorithm based on discontinuity detection(Natural Science Edition),2010(6):134-138

Google Scholar