Multiple Blind Watermark Algorithm Based on Wavelet Packet Transform and Two-Dimensional Chaos Scramble

Article Preview

Abstract:

In this paper, multiple blind watermark algorithm based on wavelet packet transform (WPT) and two-dimensional chaos image scramble is put forward. In the sub-images of WPT, multiple watermarks are embedded and distilled blindly. Meantime, the image contrast enhancement to hidden information before hand can improve its robustness effectively. In order to improve the security, two-dimensional chaos image scramble algorithm is designed. Experimental results show that the multiple blind watermark algorithm has good invisibleness, security and robustness to common image processing and noise attack.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 532-533)

Pages:

1846-1850

Citation:

Online since:

June 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Y. P. Zhang, B. L. Guo: Survey of watermarking for secure image, Computer Engineering and Applications, vol. 40, no. 1, pp.60-62, January (2004).

Google Scholar

[2] Z. H. Xie, W. F. Cao: On DWT and HVS based image copyright protection, Computer Application and Software, vol. 27, no. 8, pp.75-77, August (2010).

Google Scholar

[3] F. Peng, X. F. Huang, T. Deng: M. Long: A blind watermarking algorithm for 2D engineering graphics based on entity substitution and mean value of wavelet coefficients, Journal of Computer Research and Development, 47(8): 1346-1353, (2010).

Google Scholar

[4] Y. Wo, G. Q. Han, B. Zhang: Gray-level adaptive blind watermarking based on human visual perception, Journal of China Institute of Communications, vol. 24, no. 9, pp.132-141, September (2003).

Google Scholar

[5] C. G. Wang, Z. P. Hu: Image enhancement based on wavelet packet decomposition and homomorphic filtering, Computer Engineering and Applications, vol. 39, no. 28, pp.92-93, October (2003).

Google Scholar

[6] X. H. Zhang, J. Huang, P. Xie: Network real-time communication chaotic encryption based on chaos map, Computer Applications and Software, vol. 21, no. 3, pp.98-101, March (2004).

Google Scholar

[7] J. G. Cao, J. E. Fowler, N. H. Younan: An image-adaptive watermark based on a redundant wavelet transform, in Proceedings of the International Conference on Image Processing, Thessaloniki, Greece: IEEE, 2001: 277-280.

DOI: 10.1109/icip.2001.958478

Google Scholar