{"title":"基于小波变换的盲水印技术","authors":"Ikpyo Hong, Intaek Kim, Seung-Soo Han","doi":"10.1109/ISIE.2001.932010","DOIUrl":null,"url":null,"abstract":"In this paper, we propose an effective watermarking algorithm for copyright protection. This is a blind watermarking which can confirm the copyright without the original image. The original image is transformed using wavelet transform and flags are created with the secret key. The secret key is the thing we need to extract the flags and compare the extracted flags with the original flags that are created during the watermark embedding procedure. To criticize the robustness of this scheme we compared the extracted flag with the original flag after several attacks such as JPEG compression, collusion, resize and noise addition. The results show that the proposed watermarking algorithm has excellent robustness against various watermark attacks with the high quality of the watermarked image.","PeriodicalId":124749,"journal":{"name":"ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570)","volume":"243 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"73","resultStr":"{\"title\":\"A blind watermarking technique using wavelet transform\",\"authors\":\"Ikpyo Hong, Intaek Kim, Seung-Soo Han\",\"doi\":\"10.1109/ISIE.2001.932010\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose an effective watermarking algorithm for copyright protection. This is a blind watermarking which can confirm the copyright without the original image. The original image is transformed using wavelet transform and flags are created with the secret key. The secret key is the thing we need to extract the flags and compare the extracted flags with the original flags that are created during the watermark embedding procedure. To criticize the robustness of this scheme we compared the extracted flag with the original flag after several attacks such as JPEG compression, collusion, resize and noise addition. The results show that the proposed watermarking algorithm has excellent robustness against various watermark attacks with the high quality of the watermarked image.\",\"PeriodicalId\":124749,\"journal\":{\"name\":\"ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570)\",\"volume\":\"243 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"73\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIE.2001.932010\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIE.2001.932010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A blind watermarking technique using wavelet transform
In this paper, we propose an effective watermarking algorithm for copyright protection. This is a blind watermarking which can confirm the copyright without the original image. The original image is transformed using wavelet transform and flags are created with the secret key. The secret key is the thing we need to extract the flags and compare the extracted flags with the original flags that are created during the watermark embedding procedure. To criticize the robustness of this scheme we compared the extracted flag with the original flag after several attacks such as JPEG compression, collusion, resize and noise addition. The results show that the proposed watermarking algorithm has excellent robustness against various watermark attacks with the high quality of the watermarked image.