Research on the Zero-Bit Watermarking Algorithms Based on the Matrix Decomposition for Digital Images

Article Preview

Abstract:

Due to the problem that the many digital images can be modified more and more easily, watermarking algorithms are proposed. There are many types of digital watermarking algorithms, such as robust digital watermarking algorithms, watermarking schemes for authentication, and reversible digital watermarking algorithms. However, there are some special images, such as the digital medical images for remote treatment, the military images for tracking object, and the remote sensing images, and they are so sensitive to any modification that we should authenticate the copyright by special technique. And this technique is zero-bit watermarking algorithms. In this paper, about zero-bit watermarking algorithms are surveyed. The basic procedures of these classical algorithms are analyzed, and some suggestion about the zero-bit algorithms is given.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

674-677

Citation:

Online since:

March 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chang S S, Lin C H, Chen T H, et al. Robust Watermarking for Multiple Images and Users Based on Visual Cryptography[M]/Genetic and Evolutionary Computing. Springer International Publishing, 2014: 175-182.

DOI: 10.1007/978-3-319-01796-9_18

Google Scholar

[2] Mohammadi S, Talebi S. An image watermarking algorithm based on chaotic maps and wavelet transform[C]/Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on. IEEE, 2012: 135-140.

DOI: 10.1109/iscisc.2012.6408208

Google Scholar

[3] Patra J C, Phua J E, Bornand C. A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression[J]. Digital Signal Processing, 2010, 20(6): 1597-1611.

DOI: 10.1016/j.dsp.2010.03.010

Google Scholar

[4] Tian J. Reversible data embedding using a difference expansion[J]. IEEE Trans. Circuits Syst. Video Techn., 2003, 13(8): 890-896.

DOI: 10.1109/tcsvt.2003.815962

Google Scholar

[5] Tsai P, Hu Y C, Yeh H L. Reversible image hiding scheme using predictive coding and histogram shifting[J]. Signal Processing, 2009, 89(6): 1129-1143.

DOI: 10.1016/j.sigpro.2008.12.017

Google Scholar

[6] Lu T C, Tseng C Y, Wu J H. Dual imaging-based reversible hiding technique using LSB matching[J]. Signal Processing, 2015, 108: 77-89.

DOI: 10.1016/j.sigpro.2014.08.022

Google Scholar

[7] Liu J J, Tao L. Robust image zero-watermarking using non-negative matrix factorization[J]. Computer Engineering and Applications, 2012, 48(16): 90-93.

Google Scholar

[8] Gao G, Jiang G. Zero-bit watermarking resisting geometric attacks based on composite-chaos optimized SVR model[J]. The Journal of China Universities of Posts and Telecommunications, 2011, 18(2): 94-101.

DOI: 10.1016/s1005-8885(10)60050-7

Google Scholar

[9] Furon T. A constructive and unifying framework for zero-bit watermarking[J]. Information Forensics and Security, IEEE Transactions on, 2007, 2(2): 149-163.

DOI: 10.1109/tifs.2007.897272

Google Scholar

[10] Wen-ge F, Lei L. SVD and DWT zero-bit watermarking algorithm[C]/Informatics in Control, Automation and Robotics (CAR), 2010 2nd International Asia Conference on. IEEE, 2010, 3: 361-364.

DOI: 10.1109/car.2010.5456709

Google Scholar