S. M. Mohidul Islam, R. Debnath, S. K. Alamgir Hossain
{"title":"基于DWT的数字水印技术及其对图像旋转、缩放、JPEG压缩、裁剪和多重水印的鲁棒性","authors":"S. M. Mohidul Islam, R. Debnath, S. K. Alamgir Hossain","doi":"10.1109/ICICT.2007.375386","DOIUrl":null,"url":null,"abstract":"We propose in this paper a discrete wavelet transform (DWT) based digital image watermarking technique. For embedding process, we consider the watermark signal as a binary sequence which is embedded to the high (HL and HH) frequency band of the blue channel. For detecting process, the correlation between the high frequency band DWT coefficients of the watermarked image and the watermark signal is compared with the predefined threshold to determine whether the watermark is present or not. The experimental results show that the method is comparatively robust to several attacks such as rotation, scaling, JPEG compression, cropping, and multiple watermarking.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"30","resultStr":"{\"title\":\"DWT Based Digital Watermarking Technique and its Robustness on Image Rotation, Scaling, JPEG compression, Cropping and Multiple Watermarking\",\"authors\":\"S. M. Mohidul Islam, R. Debnath, S. K. Alamgir Hossain\",\"doi\":\"10.1109/ICICT.2007.375386\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose in this paper a discrete wavelet transform (DWT) based digital image watermarking technique. For embedding process, we consider the watermark signal as a binary sequence which is embedded to the high (HL and HH) frequency band of the blue channel. For detecting process, the correlation between the high frequency band DWT coefficients of the watermarked image and the watermark signal is compared with the predefined threshold to determine whether the watermark is present or not. The experimental results show that the method is comparatively robust to several attacks such as rotation, scaling, JPEG compression, cropping, and multiple watermarking.\",\"PeriodicalId\":206443,\"journal\":{\"name\":\"2007 International Conference on Information and Communication Technology\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"30\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Information and Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICT.2007.375386\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Information and Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT.2007.375386","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DWT Based Digital Watermarking Technique and its Robustness on Image Rotation, Scaling, JPEG compression, Cropping and Multiple Watermarking
We propose in this paper a discrete wavelet transform (DWT) based digital image watermarking technique. For embedding process, we consider the watermark signal as a binary sequence which is embedded to the high (HL and HH) frequency band of the blue channel. For detecting process, the correlation between the high frequency band DWT coefficients of the watermarked image and the watermark signal is compared with the predefined threshold to determine whether the watermark is present or not. The experimental results show that the method is comparatively robust to several attacks such as rotation, scaling, JPEG compression, cropping, and multiple watermarking.