{"title":"A blind watermarking technique using wavelet transform","authors":"Ikpyo Hong, Intaek Kim, Seung-Soo Han","doi":"10.1109/ISIE.2001.932010","DOIUrl":null,"url":null,"abstract":"In this paper, we propose an effective watermarking algorithm for copyright protection. This is a blind watermarking which can confirm the copyright without the original image. The original image is transformed using wavelet transform and flags are created with the secret key. The secret key is the thing we need to extract the flags and compare the extracted flags with the original flags that are created during the watermark embedding procedure. To criticize the robustness of this scheme we compared the extracted flag with the original flag after several attacks such as JPEG compression, collusion, resize and noise addition. The results show that the proposed watermarking algorithm has excellent robustness against various watermark attacks with the high quality of the watermarked image.","PeriodicalId":124749,"journal":{"name":"ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570)","volume":"243 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"73","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIE.2001.932010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 73
Abstract
In this paper, we propose an effective watermarking algorithm for copyright protection. This is a blind watermarking which can confirm the copyright without the original image. The original image is transformed using wavelet transform and flags are created with the secret key. The secret key is the thing we need to extract the flags and compare the extracted flags with the original flags that are created during the watermark embedding procedure. To criticize the robustness of this scheme we compared the extracted flag with the original flag after several attacks such as JPEG compression, collusion, resize and noise addition. The results show that the proposed watermarking algorithm has excellent robustness against various watermark attacks with the high quality of the watermarked image.