{"title":"基于混沌映射的鲁棒数字水印","authors":"Niansheng Liu, Donghui Guo","doi":"10.1109/ICASID.2012.6325280","DOIUrl":null,"url":null,"abstract":"Based on chaotic maps, a novel robust watermarking algorithm is presented in this paper. The proposed approach improves the invisibility, robustness and security of traditional watermarking algorithm by using chaotic sequences. Taking advantage of the characteristics of extreme sensitivity to initial conditions, Chebyshev maps are used to generate substantially different watermarks as a key. This technique has been shown to offer an added security advantage over the more traditionally generated watermarks created from pseudorandom sequences, in that only the function seed needs to be stored. Various kinds of images are selected as watermark images in order to prove the fidelity of the proposed scheme. Simulation of the algorithm is performed on different types of images, and the results are compared with existing algorithms. Results show that the proposed scheme is simple and applicable, and can resist many attacks such as JPEG compression, rotation, cropping and noising.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"419 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Robust digital watermarking based on chaotic maps\",\"authors\":\"Niansheng Liu, Donghui Guo\",\"doi\":\"10.1109/ICASID.2012.6325280\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Based on chaotic maps, a novel robust watermarking algorithm is presented in this paper. The proposed approach improves the invisibility, robustness and security of traditional watermarking algorithm by using chaotic sequences. Taking advantage of the characteristics of extreme sensitivity to initial conditions, Chebyshev maps are used to generate substantially different watermarks as a key. This technique has been shown to offer an added security advantage over the more traditionally generated watermarks created from pseudorandom sequences, in that only the function seed needs to be stored. Various kinds of images are selected as watermark images in order to prove the fidelity of the proposed scheme. Simulation of the algorithm is performed on different types of images, and the results are compared with existing algorithms. Results show that the proposed scheme is simple and applicable, and can resist many attacks such as JPEG compression, rotation, cropping and noising.\",\"PeriodicalId\":408223,\"journal\":{\"name\":\"Anti-counterfeiting, Security, and Identification\",\"volume\":\"419 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Anti-counterfeiting, Security, and Identification\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASID.2012.6325280\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Anti-counterfeiting, Security, and Identification","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASID.2012.6325280","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Based on chaotic maps, a novel robust watermarking algorithm is presented in this paper. The proposed approach improves the invisibility, robustness and security of traditional watermarking algorithm by using chaotic sequences. Taking advantage of the characteristics of extreme sensitivity to initial conditions, Chebyshev maps are used to generate substantially different watermarks as a key. This technique has been shown to offer an added security advantage over the more traditionally generated watermarks created from pseudorandom sequences, in that only the function seed needs to be stored. Various kinds of images are selected as watermark images in order to prove the fidelity of the proposed scheme. Simulation of the algorithm is performed on different types of images, and the results are compared with existing algorithms. Results show that the proposed scheme is simple and applicable, and can resist many attacks such as JPEG compression, rotation, cropping and noising.