{"title":"Transform domain technique: robust watermarking for digital images","authors":"S. Suthaharan, S. Sathananthan","doi":"10.1109/SECON.2000.845602","DOIUrl":null,"url":null,"abstract":"A digital image watermarking technique that is based on the human visual system (HVS) characteristics and the statistical behavior of the edge structures is presented. In this technique the watermark is generated using (i) human visual system parameters so that the watermark does not alter the perceived quality (transparency requirement) of a watermarked image and (ii) a sequence of random numbers generated from a bounded normal distribution so that the technique is robust to malicious attacks. The watermarking technique inserts the watermark into the perceptually most significant discrete cosine transform (DCT) coefficients so that the technique is (i) robust to image processing operations (such as image compression), (ii) robust to malicious watermark attacks and (iii) perceptually invisible.","PeriodicalId":206022,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2000. 'Preparing for The New Millennium' (Cat. No.00CH37105)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2000-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE SoutheastCon 2000. 'Preparing for The New Millennium' (Cat. No.00CH37105)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2000.845602","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
A digital image watermarking technique that is based on the human visual system (HVS) characteristics and the statistical behavior of the edge structures is presented. In this technique the watermark is generated using (i) human visual system parameters so that the watermark does not alter the perceived quality (transparency requirement) of a watermarked image and (ii) a sequence of random numbers generated from a bounded normal distribution so that the technique is robust to malicious attacks. The watermarking technique inserts the watermark into the perceptually most significant discrete cosine transform (DCT) coefficients so that the technique is (i) robust to image processing operations (such as image compression), (ii) robust to malicious watermark attacks and (iii) perceptually invisible.