J. Panyavaraporn, Paramate Horkaew, W. Wongtrairat
{"title":"QR code watermarking algorithm based on wavelet transform","authors":"J. Panyavaraporn, Paramate Horkaew, W. Wongtrairat","doi":"10.1109/ISCIT.2013.6645969","DOIUrl":null,"url":null,"abstract":"Copyright protection and authentication have become increasingly more important in daily life. The digital watermark is one of the techniques invented to tackle this issue. In this paper, a digitally invisible watermark is embedded in a QR code image by means of wavelet transform. In the embedding process, a binary image, logo, is transformed into a corresponding watermark and then embeded into a selected subband. The experimental results illustrated that, for all the cases considered in this paper is more robustness to attacks and as such it can serve as a viable copyright protection and authentication tool.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCIT.2013.6645969","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19
Abstract
Copyright protection and authentication have become increasingly more important in daily life. The digital watermark is one of the techniques invented to tackle this issue. In this paper, a digitally invisible watermark is embedded in a QR code image by means of wavelet transform. In the embedding process, a binary image, logo, is transformed into a corresponding watermark and then embeded into a selected subband. The experimental results illustrated that, for all the cases considered in this paper is more robustness to attacks and as such it can serve as a viable copyright protection and authentication tool.