{"title":"基于遗传算法的小波图像水印","authors":"M. Nakamoto, S. Fujimoto, A. Doi, T. Hinamoto","doi":"10.1109/ICOSP.2008.4697055","DOIUrl":null,"url":null,"abstract":"For copyright protection, the bit pattern is embedded in discrete wavelet transform (DWT) domain by using a secret key sequence. For security, it is desirable to be hard to counterfeit the key sequence. In this work, we consider a watermarking method with a key sequence which is difficult to counterfeit. Additionally, we show the design method of the key sequence based on the genetic algorithm (GA) so that the robustness of the watermark is strong. Finally, we show the robustness against JPEG attack by computer simulation.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Genetic algorithm approach for wavelet-based image watermarking\",\"authors\":\"M. Nakamoto, S. Fujimoto, A. Doi, T. Hinamoto\",\"doi\":\"10.1109/ICOSP.2008.4697055\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For copyright protection, the bit pattern is embedded in discrete wavelet transform (DWT) domain by using a secret key sequence. For security, it is desirable to be hard to counterfeit the key sequence. In this work, we consider a watermarking method with a key sequence which is difficult to counterfeit. Additionally, we show the design method of the key sequence based on the genetic algorithm (GA) so that the robustness of the watermark is strong. Finally, we show the robustness against JPEG attack by computer simulation.\",\"PeriodicalId\":445699,\"journal\":{\"name\":\"2008 9th International Conference on Signal Processing\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 9th International Conference on Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOSP.2008.4697055\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 9th International Conference on Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOSP.2008.4697055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Genetic algorithm approach for wavelet-based image watermarking
For copyright protection, the bit pattern is embedded in discrete wavelet transform (DWT) domain by using a secret key sequence. For security, it is desirable to be hard to counterfeit the key sequence. In this work, we consider a watermarking method with a key sequence which is difficult to counterfeit. Additionally, we show the design method of the key sequence based on the genetic algorithm (GA) so that the robustness of the watermark is strong. Finally, we show the robustness against JPEG attack by computer simulation.