{"title":"利用费马数变换变换域脆弱水印","authors":"K. M. Varuna Rao, U. Ghanekar","doi":"10.1109/ICCIC.2015.7435691","DOIUrl":null,"url":null,"abstract":"This paper presents a transform domain fragile watermarking technique based on Fermat number transform (FNT). This transform domain is very simple and efficient in terms of computational complexity and speed. FNT is a true digital transform, which makes the watermarking method free from round-off errors. In this method, the image is divided into non-overlapping blocks and FNT is applied on each block. The transformed coefficients are then quantized and embedded by the watermark bits. Finally, inverse FNT is taken and all the blocks are combined together. This method has eight variations depending on the fragility requirements. Depending upon the requirement of fragility and PSNR different variants of this method can be used.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Transform domain fragile watermarking using fermat number transform\",\"authors\":\"K. M. Varuna Rao, U. Ghanekar\",\"doi\":\"10.1109/ICCIC.2015.7435691\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a transform domain fragile watermarking technique based on Fermat number transform (FNT). This transform domain is very simple and efficient in terms of computational complexity and speed. FNT is a true digital transform, which makes the watermarking method free from round-off errors. In this method, the image is divided into non-overlapping blocks and FNT is applied on each block. The transformed coefficients are then quantized and embedded by the watermark bits. Finally, inverse FNT is taken and all the blocks are combined together. This method has eight variations depending on the fragility requirements. Depending upon the requirement of fragility and PSNR different variants of this method can be used.\",\"PeriodicalId\":276894,\"journal\":{\"name\":\"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIC.2015.7435691\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2015.7435691","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Transform domain fragile watermarking using fermat number transform
This paper presents a transform domain fragile watermarking technique based on Fermat number transform (FNT). This transform domain is very simple and efficient in terms of computational complexity and speed. FNT is a true digital transform, which makes the watermarking method free from round-off errors. In this method, the image is divided into non-overlapping blocks and FNT is applied on each block. The transformed coefficients are then quantized and embedded by the watermark bits. Finally, inverse FNT is taken and all the blocks are combined together. This method has eight variations depending on the fragility requirements. Depending upon the requirement of fragility and PSNR different variants of this method can be used.