A Digital Watermarking Algorithm Based on the Wavelet Bit Plane Coding

Article Preview

Abstract:

In this paper a algorithm of digital image watermark based on wavelet bit plane is introduced, and the original image is not required for detecting the watermarking. The digital watermark is embedded by changing information of some bit planes in DWT images at different resolutions. The watermark can be extracted on the difference bit plane values of subimages of the decomposed watermarked image which is then mapped to an image with a few shades of gray. Experimental results show that the watermark is robust to several signal processing techniques, including JPEG compression and some image processing operations

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 821-822)

Pages:

1438-1441

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] R B Wolfgang, E J Delp. A watermark for digital images, Proc IEEE Int Conf on Image Processing: 219-222, (1996).

Google Scholar

[2] I Pitas. A method for signature casting on digital image, Proc IEEE Int Conf on Image Processing: 215-218, (1996).

Google Scholar

[3] Van Schyndel R, Tirkel A, In: IEEE Proceeding on International Conference on Image Processing, Austin, Tex., IEEE Press : 86-90, (1994).

Google Scholar

[4] Winkler,S., A Perceptual Distortion Metric for Digital Color Video, in Proceedings of the SPIE 3644, Human Vision and Electronic Imaging: 175-184, (1999).

DOI: 10.1117/12.348438

Google Scholar

[5] Van Schyndel R, Tirkel A, Osborne C. A digital watermark. In: IEEE Proceeding on International Conference on Image Processing, Austin, Tex IEEE Press: 86-90, (1994).

DOI: 10.1109/icip.1994.413536

Google Scholar

[6] Bender W, Gruhl D, Morimoto N et al. Techniques for data hiding. IBM System Journal: 313-336, (1996).

DOI: 10.1147/sj.353.0313

Google Scholar

[7] W. Bender. D. Gruhl. N. Morimoto. et. al. Techniques for data hiding. IBM Systems Journal Sep35(3-4): 313-318 (1996).

DOI: 10.1147/sj.353.0313

Google Scholar