A Bit-Decomposition Adaptive Watermarking Algorithm Based on the Multi-Polar Mask

Article Preview

Abstract:

Traditional digital watermarking usually adopts the gray image as hidden information, more embedded information result in largely modifying more image data. Binary image can guarantee good affection of human vision, a bit-decomposition adaptive watermarking algorithm based on the mask is proposed. According to the superiority of binary, classifying binary images to three kinds of sub graph (High, Middle, and Low-sub graph); multi-masks are constructed by the importance of different sub graphs and cover the original image. Experimental results demonstrate the proposed scheme not only has better visual quality, but also is very robust to common image processing and geometric attacks.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 467-469)

Pages:

912-917

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Li Lei-da, Guo Bao-long, Wu Xiao-yao. A New Spatial Domain Image Watermarking Scheme Resisting Geometric Attacks[J]. ACTA AUTOMATICA SINICA, 2008, 34(10): 1235-1241.

DOI: 10.3724/sp.j.1004.2008.01235

Google Scholar

[2] Osamah M. AL-Qershi, Khoo Bee Ee. A Comparison Between Block-Based and Non Block-Based Watermarking Schemes based on DWT. 2009 Second International Symposium on Electronic Commerce and Security. 2009: 169-173.

DOI: 10.1109/isecs.2009.71

Google Scholar

[3] Pan Jeng-Shyang. A VQ-based robust multi-watermarking algorithm. IEEE Region 10 Annual International Conference, 2002: 117-120.

DOI: 10.1109/tencon.2002.1181228

Google Scholar

[4] Kimoto T. An Advanced Method for Watermarking Digital signals in Bit-Plane Structure. IEEE ICC 2009 proceedings. 2009: 1-5.

DOI: 10.1109/icc.2009.5198717

Google Scholar

[5] Cox J, Jean-Paul.G. Linnartz. Some General Methods for Tampering with Watermarks. IEEE Journal on Selected Areas in Communications. 1998, 16(4): 587-593.

DOI: 10.1109/49.668980

Google Scholar

[6] Vinicius Licks, Ramiro Jordan. Geometric Attacks on Image Watermarking Systems. IEEE Multimedia, 2005, 12(3): 68-78.

DOI: 10.1109/mmul.2005.46

Google Scholar

[7] Yongri Piao, Seoktae Kim. A New Algorithm for Wavelet Watermarking Based on Liner Bit Expansion and Its Similarity Measurement. 2007 International Conference on Convergence Information Technology. 2007: 263-268.

DOI: 10.1109/iccit.2007.16

Google Scholar

[8] Yan Dejun, Yang Rijing Blind Digital Image Watermarking Technique Based On Intermediate Significant Bit and Discrete Wavelet Transform. 2009 International Conference on Computational Intelligence and Software Engineering. (2009).

DOI: 10.1109/cise.2009.5364237

Google Scholar

[9] Li Xudong, Zhang Zhenyue. Public Watermarking Using Matrix Norm[J]. Journal of Computer-Aided Design&Computer Graphics. 2005, 17(8): 1857-1861.

Google Scholar