{"title":"联合小波压缩与认证水印","authors":"L. Xie, G. Arce","doi":"10.1109/ICIP.1998.723409","DOIUrl":null,"url":null,"abstract":"A blind watermarking technique embedding a digital image signature for authentication is developed. The signature algorithm is first implemented in the discrete wavelet transform (DWT) domain and is later coupled within the SPIHT compression algorithm. The capacity of the watermarking method is determined by the upper bound on the attainable information bit rate that can be hidden in the image using two methods: binary engraving and multi-bit engraving.","PeriodicalId":220168,"journal":{"name":"Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"176","resultStr":"{\"title\":\"Joint wavelet compression and authentication watermarking\",\"authors\":\"L. Xie, G. Arce\",\"doi\":\"10.1109/ICIP.1998.723409\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A blind watermarking technique embedding a digital image signature for authentication is developed. The signature algorithm is first implemented in the discrete wavelet transform (DWT) domain and is later coupled within the SPIHT compression algorithm. The capacity of the watermarking method is determined by the upper bound on the attainable information bit rate that can be hidden in the image using two methods: binary engraving and multi-bit engraving.\",\"PeriodicalId\":220168,\"journal\":{\"name\":\"Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)\",\"volume\":\"108 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-10-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"176\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIP.1998.723409\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIP.1998.723409","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Joint wavelet compression and authentication watermarking
A blind watermarking technique embedding a digital image signature for authentication is developed. The signature algorithm is first implemented in the discrete wavelet transform (DWT) domain and is later coupled within the SPIHT compression algorithm. The capacity of the watermarking method is determined by the upper bound on the attainable information bit rate that can be hidden in the image using two methods: binary engraving and multi-bit engraving.