{"title":"基于改进DCT的文本图像零水印算法","authors":"Gui Feng, X. Huang","doi":"10.1109/ICASID.2012.6325285","DOIUrl":null,"url":null,"abstract":"An improved zero-watermarking algorithm, which solving the contradiction between the watermark embedding capacity of and invisibility, was proposed. The zero-watermarking algorithm needn't to modify the carrier; so many watermarking methods can be used and without the need to consider the embedding capacity, and robustness is better than the normal watermarking algorithm. The steps of proposed zero-watermarking algorithm are as follows: first, the text carrier is translated into the corresponding binary image, then use DCT combined with the logistic mapping to construct zero-watermark, the similarity criteria was used for the watermark detection. After many attacking experiments, performance of the algorithm shows that the robustness, invisibility and the watermark capacity of the algorithm, can meet the requirements of practical need.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"An improved DCT based zero-watermarking algorithm for text image\",\"authors\":\"Gui Feng, X. Huang\",\"doi\":\"10.1109/ICASID.2012.6325285\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An improved zero-watermarking algorithm, which solving the contradiction between the watermark embedding capacity of and invisibility, was proposed. The zero-watermarking algorithm needn't to modify the carrier; so many watermarking methods can be used and without the need to consider the embedding capacity, and robustness is better than the normal watermarking algorithm. The steps of proposed zero-watermarking algorithm are as follows: first, the text carrier is translated into the corresponding binary image, then use DCT combined with the logistic mapping to construct zero-watermark, the similarity criteria was used for the watermark detection. After many attacking experiments, performance of the algorithm shows that the robustness, invisibility and the watermark capacity of the algorithm, can meet the requirements of practical need.\",\"PeriodicalId\":408223,\"journal\":{\"name\":\"Anti-counterfeiting, Security, and Identification\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Anti-counterfeiting, Security, and Identification\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASID.2012.6325285\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Anti-counterfeiting, Security, and Identification","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASID.2012.6325285","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An improved DCT based zero-watermarking algorithm for text image
An improved zero-watermarking algorithm, which solving the contradiction between the watermark embedding capacity of and invisibility, was proposed. The zero-watermarking algorithm needn't to modify the carrier; so many watermarking methods can be used and without the need to consider the embedding capacity, and robustness is better than the normal watermarking algorithm. The steps of proposed zero-watermarking algorithm are as follows: first, the text carrier is translated into the corresponding binary image, then use DCT combined with the logistic mapping to construct zero-watermark, the similarity criteria was used for the watermark detection. After many attacking experiments, performance of the algorithm shows that the robustness, invisibility and the watermark capacity of the algorithm, can meet the requirements of practical need.