{"title":"基于小波域的数字图像水印抗几何攻击算法","authors":"Na Ma, Qiang Zhang, Ying Li","doi":"10.1109/BICTA.2010.5645225","DOIUrl":null,"url":null,"abstract":"This paper presents a new wavelet domain watermarking method, the carrier image using wavelet decomposition. After the Walsh transform low frequency wavelet coefficients, calculated by block adaptive embedding strength, modify the wavelet coefficients of each block, and then do singular value decomposition (SVD), repeat on embedded watermark in the singular value. Fractional part of the anti-transformed image is saved, correction of the watermarked image can be accurately extracted watermark. The experimental results demonstrate that the proposed algorithm can effectively resist cutting, scaling, translation and other geometric attacks, attacks in general are also robust.","PeriodicalId":302619,"journal":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Digital image watermarking robust to geometric attacks based on wavelet domain\",\"authors\":\"Na Ma, Qiang Zhang, Ying Li\",\"doi\":\"10.1109/BICTA.2010.5645225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a new wavelet domain watermarking method, the carrier image using wavelet decomposition. After the Walsh transform low frequency wavelet coefficients, calculated by block adaptive embedding strength, modify the wavelet coefficients of each block, and then do singular value decomposition (SVD), repeat on embedded watermark in the singular value. Fractional part of the anti-transformed image is saved, correction of the watermarked image can be accurately extracted watermark. The experimental results demonstrate that the proposed algorithm can effectively resist cutting, scaling, translation and other geometric attacks, attacks in general are also robust.\",\"PeriodicalId\":302619,\"journal\":{\"name\":\"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BICTA.2010.5645225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BICTA.2010.5645225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Digital image watermarking robust to geometric attacks based on wavelet domain
This paper presents a new wavelet domain watermarking method, the carrier image using wavelet decomposition. After the Walsh transform low frequency wavelet coefficients, calculated by block adaptive embedding strength, modify the wavelet coefficients of each block, and then do singular value decomposition (SVD), repeat on embedded watermark in the singular value. Fractional part of the anti-transformed image is saved, correction of the watermarked image can be accurately extracted watermark. The experimental results demonstrate that the proposed algorithm can effectively resist cutting, scaling, translation and other geometric attacks, attacks in general are also robust.