{"title":"基于小波变换技术的图像数字水印算法及鲁棒性研究","authors":"Jianmin Xie, Qin Qin","doi":"10.1109/ICIME.2010.5478135","DOIUrl":null,"url":null,"abstract":"Proposed based on wavelet transform of digital image watermark embedding and extraction algorithms, according to the algorithm designed and implemented with an intuitive visual significance of the binary image and extract the hidden watermark, and Of the algorithm of filtering, noise, geometry and other attacks on experiments. To quantitatively validate the robustness of the algorithm, using Normalized Cross-Correlation to Verify extracted watermark with the original watermark similarity, using PeakSignal-to-Noise Ratio to evaluate the difference between the original image and the watermarked image. The experimental results show that the algorithm research paper is feasible, simple, easy to implement.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Study of image digital watermarking algorithm and robustness based on the wavelet transform techniques\",\"authors\":\"Jianmin Xie, Qin Qin\",\"doi\":\"10.1109/ICIME.2010.5478135\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Proposed based on wavelet transform of digital image watermark embedding and extraction algorithms, according to the algorithm designed and implemented with an intuitive visual significance of the binary image and extract the hidden watermark, and Of the algorithm of filtering, noise, geometry and other attacks on experiments. To quantitatively validate the robustness of the algorithm, using Normalized Cross-Correlation to Verify extracted watermark with the original watermark similarity, using PeakSignal-to-Noise Ratio to evaluate the difference between the original image and the watermarked image. The experimental results show that the algorithm research paper is feasible, simple, easy to implement.\",\"PeriodicalId\":382705,\"journal\":{\"name\":\"2010 2nd IEEE International Conference on Information Management and Engineering\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 2nd IEEE International Conference on Information Management and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIME.2010.5478135\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd IEEE International Conference on Information Management and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIME.2010.5478135","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Study of image digital watermarking algorithm and robustness based on the wavelet transform techniques
Proposed based on wavelet transform of digital image watermark embedding and extraction algorithms, according to the algorithm designed and implemented with an intuitive visual significance of the binary image and extract the hidden watermark, and Of the algorithm of filtering, noise, geometry and other attacks on experiments. To quantitatively validate the robustness of the algorithm, using Normalized Cross-Correlation to Verify extracted watermark with the original watermark similarity, using PeakSignal-to-Noise Ratio to evaluate the difference between the original image and the watermarked image. The experimental results show that the algorithm research paper is feasible, simple, easy to implement.