Kang et al., 2014 - Google Patents
A digital watermarking approach based on DCT domain combining QR code and chaotic theoryKang et al., 2014
View PDF- Document ID
- 5312468064906548868
- Author
- Kang Q
- Li K
- Yang J
- Publication year
- Publication venue
- 2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing (ICCP)
External Links
Snippet
This paper proposes a robust watermarking approach based on Discrete Cosine Transform (DCT) domain that combines Quick Response (QR) Code and chaotic system. When embed the watermark, the high error correction performance and the strong decoding capability of …
- 230000000739 chaotic 0 title abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qi et al. | A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization | |
Subhedar et al. | Current status and key issues in image steganography: A survey | |
Kang et al. | A digital watermarking approach based on DCT domain combining QR code and chaotic theory | |
Singh et al. | Wavelet based image watermarking: futuristic concepts in information security | |
Phadikar et al. | Region based QIM digital watermarking scheme for image database in DCT domain | |
Singh et al. | Experimental studies of LSB watermarking with different noise | |
Liu et al. | Robust blind image watermarking based on chaotic mixtures | |
Bhattacharyya et al. | Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography | |
Akinola et al. | On the image quality and encoding times of LSB, MSB and combined LSB-MSB steganography algorithms using digital images | |
Garg et al. | A robust technique for biometric image authentication using invisible watermarking | |
CN102930498B (en) | A kind of digital watermark embedding based on Lifting Wavelet and extracting method | |
Singh et al. | Transform domain techniques for image steganography | |
Pal | A survey on digital watermarking and its application | |
Masoumi et al. | Content protection in video data based on robust digital watermarking resistant to intentional and unintentional attacks. | |
Nikbakht et al. | Targeted watermark removal of a SVD-based image watermarking scheme | |
Kekre et al. | Robust Watermarking Technique using Hybrid Wavelet Transform Generated from Kekre Transform and Discrete Cosine Transform | |
Liu et al. | A Survey of Fragile Watermarking-based Image Authentication Techniques. | |
Bideh et al. | Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications | |
Kumar et al. | A hybrid novel approach of video watermarking | |
Obimbo et al. | Using digital watermarking for copyright protection | |
Roy et al. | A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification | |
Wang et al. | Review on digital image watermarking based on singular value decomposition | |
CN109410115B (en) | Adaptive capacity image blind watermark embedding and extracting method based on SIFT feature points | |
Bhattacharya | Survey on Digital Watermarking–A Digital Forensics & Security Application | |
Wu et al. | A DCT-based robust image watermarking using local moment |