{"title":"基于CT-SVD和混沌元胞自动机的数字图像盲水印","authors":"R. Hadi, P. Ayubi","doi":"10.1109/ICCKE.2012.6395396","DOIUrl":null,"url":null,"abstract":"In this paper a new blind watermarking scheme for Gray scale image is proposed based on contourlet Transform, Singular value decomposition and chaotic cellular automata. Contourlet transform is a new two-dimensional extension of the wavelet transform using multiscale and directional filter banks. In this work, Cellular automata is used to encrypt the watermarking logo to improve the security of watermarked image also used to determine the location of image's block for the watermarking embedding. To test the robustness and effectiveness of our proposed method, Several attacks are applied to the watermarked image and the best results have been reported. Also we used four key for improve security watermarking.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Blind digital image watermarking based on CT-SVD and chaotic cellular automata\",\"authors\":\"R. Hadi, P. Ayubi\",\"doi\":\"10.1109/ICCKE.2012.6395396\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper a new blind watermarking scheme for Gray scale image is proposed based on contourlet Transform, Singular value decomposition and chaotic cellular automata. Contourlet transform is a new two-dimensional extension of the wavelet transform using multiscale and directional filter banks. In this work, Cellular automata is used to encrypt the watermarking logo to improve the security of watermarked image also used to determine the location of image's block for the watermarking embedding. To test the robustness and effectiveness of our proposed method, Several attacks are applied to the watermarked image and the best results have been reported. Also we used four key for improve security watermarking.\",\"PeriodicalId\":154379,\"journal\":{\"name\":\"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCKE.2012.6395396\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE.2012.6395396","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Blind digital image watermarking based on CT-SVD and chaotic cellular automata
In this paper a new blind watermarking scheme for Gray scale image is proposed based on contourlet Transform, Singular value decomposition and chaotic cellular automata. Contourlet transform is a new two-dimensional extension of the wavelet transform using multiscale and directional filter banks. In this work, Cellular automata is used to encrypt the watermarking logo to improve the security of watermarked image also used to determine the location of image's block for the watermarking embedding. To test the robustness and effectiveness of our proposed method, Several attacks are applied to the watermarked image and the best results have been reported. Also we used four key for improve security watermarking.