{"title":"Blind digital image watermarking based on CT-SVD and chaotic cellular automata","authors":"R. Hadi, P. Ayubi","doi":"10.1109/ICCKE.2012.6395396","DOIUrl":null,"url":null,"abstract":"In this paper a new blind watermarking scheme for Gray scale image is proposed based on contourlet Transform, Singular value decomposition and chaotic cellular automata. Contourlet transform is a new two-dimensional extension of the wavelet transform using multiscale and directional filter banks. In this work, Cellular automata is used to encrypt the watermarking logo to improve the security of watermarked image also used to determine the location of image's block for the watermarking embedding. To test the robustness and effectiveness of our proposed method, Several attacks are applied to the watermarked image and the best results have been reported. Also we used four key for improve security watermarking.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE.2012.6395396","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In this paper a new blind watermarking scheme for Gray scale image is proposed based on contourlet Transform, Singular value decomposition and chaotic cellular automata. Contourlet transform is a new two-dimensional extension of the wavelet transform using multiscale and directional filter banks. In this work, Cellular automata is used to encrypt the watermarking logo to improve the security of watermarked image also used to determine the location of image's block for the watermarking embedding. To test the robustness and effectiveness of our proposed method, Several attacks are applied to the watermarked image and the best results have been reported. Also we used four key for improve security watermarking.