{"title":"A wavelet-based method of zero-watermark","authors":"Sheng-bing Che, Bin Ma, Zuguo Che, Quiangbo Huang","doi":"10.1109/ICWAPR.2009.5207492","DOIUrl":null,"url":null,"abstract":"In this paper, a wavelet-based digital image watermarking algorithm is putforward, advantage of the zero-watermark. In proposed algorithm, the key is generated by XOR operation.This algorithm has very srong robustness, because of the pixel point are hardly changed. At the same time it has very strong invisibility because it dose not modify the data of the original image. Experiments show that a better robustness to the image processing such as JPEG compression, noise adding and smoothing filtering can be achieved. Meanwhile, embedding infomation in a large amount, the number of data bits reaches to a quarter that of the original image pixels. What's more, it can ascertain the position of vicious attack exactly.","PeriodicalId":424264,"journal":{"name":"2009 International Conference on Wavelet Analysis and Pattern Recognition","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Wavelet Analysis and Pattern Recognition","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWAPR.2009.5207492","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
In this paper, a wavelet-based digital image watermarking algorithm is putforward, advantage of the zero-watermark. In proposed algorithm, the key is generated by XOR operation.This algorithm has very srong robustness, because of the pixel point are hardly changed. At the same time it has very strong invisibility because it dose not modify the data of the original image. Experiments show that a better robustness to the image processing such as JPEG compression, noise adding and smoothing filtering can be achieved. Meanwhile, embedding infomation in a large amount, the number of data bits reaches to a quarter that of the original image pixels. What's more, it can ascertain the position of vicious attack exactly.