{"title":"基于四元子小波变换(QWT)的图像压缩-加密-水印混合算法","authors":"Abena Ndongo Hervé, Eloundou Ebassa Bertrand Ledoux, Abena Malobe Paul, Noura Alexendre","doi":"10.14419/ijet.v10i2.31630","DOIUrl":null,"url":null,"abstract":"In this article, we present a robust new hybrid algorithm combining successive compression, chaotic encryption, and blind watermarking images based on the quaternionic wavelets transform (QWT) to ensure the fast, simple and secure transfer of digital data. The calculations of the various evaluation parameters were carried out with the aim of determining the robustness of our algorithm against certain attacks. The results obtained of the reconstructed images before and after attacks of the compressed-encrypted-watermarked images are appreciated by calculating the evaluation parameters values and by the human visual system. The application of this hybrid algorithm on CFA images al-lowed us to obtain a stand-alone transmission system and ensure the integrity of digital data. ","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"34 1","pages":""},"PeriodicalIF":0.4000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hybrid compression-encryption-watermarking image algorithm based on the quaternionic wavelets transform (QWT)\",\"authors\":\"Abena Ndongo Hervé, Eloundou Ebassa Bertrand Ledoux, Abena Malobe Paul, Noura Alexendre\",\"doi\":\"10.14419/ijet.v10i2.31630\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this article, we present a robust new hybrid algorithm combining successive compression, chaotic encryption, and blind watermarking images based on the quaternionic wavelets transform (QWT) to ensure the fast, simple and secure transfer of digital data. The calculations of the various evaluation parameters were carried out with the aim of determining the robustness of our algorithm against certain attacks. The results obtained of the reconstructed images before and after attacks of the compressed-encrypted-watermarked images are appreciated by calculating the evaluation parameters values and by the human visual system. The application of this hybrid algorithm on CFA images al-lowed us to obtain a stand-alone transmission system and ensure the integrity of digital data. \",\"PeriodicalId\":40905,\"journal\":{\"name\":\"EMITTER-International Journal of Engineering Technology\",\"volume\":\"34 1\",\"pages\":\"\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"EMITTER-International Journal of Engineering Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14419/ijet.v10i2.31630\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"EMITTER-International Journal of Engineering Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14419/ijet.v10i2.31630","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Hybrid compression-encryption-watermarking image algorithm based on the quaternionic wavelets transform (QWT)
In this article, we present a robust new hybrid algorithm combining successive compression, chaotic encryption, and blind watermarking images based on the quaternionic wavelets transform (QWT) to ensure the fast, simple and secure transfer of digital data. The calculations of the various evaluation parameters were carried out with the aim of determining the robustness of our algorithm against certain attacks. The results obtained of the reconstructed images before and after attacks of the compressed-encrypted-watermarked images are appreciated by calculating the evaluation parameters values and by the human visual system. The application of this hybrid algorithm on CFA images al-lowed us to obtain a stand-alone transmission system and ensure the integrity of digital data.