A Contourlet-Based Image Watermarking Resisting to JPEG Compression
نویسندگان
چکیده
منابع مشابه
A Contourlet-Based Image Watermarking Resisting to JPEG Compression
A novel image authentication algorithm resisting to JPEG compression is proposed. The authentication watermark is generated based on the stability of relationship of adjacent Contourlet transform coefficients before and after JPEG. According to the random block mapping, the watermark is embedded into the discrete cosine transform (DCT) coefficients of other image blocks. The tampering identific...
متن کاملContourlet-based image adaptive watermarking
In the contourlet transform (CT), the Laplacian pyramid (LP) decomposes an image into a low-frequency (LF) subband and a high-frequency (HF) subband. The LF subband is created by filtering the original image with 2-D low-pass filter. However, the HF subband is created by subtracting the synthesized LF subband from the original image but not by 2-D high-pass filtering the original image. In this...
متن کاملAn Integrated Approach to Image Watermarking and JPEG-2000 Compression
A scheme which integrates image compression and image watermarking in an effective way is proposed in this research. The image compression scheme under consideration is EBCOT (Embedded Block Coding with Optimized Truncation) which has been adopted in the verification model (VM) of the emerging JPEG-2000 image compression standard. The watermark is embedded during the process when the compressed...
متن کاملA capacity estimation technique for JPEG-to-JPEG image watermarking
In JPEG-to-JPEG image watermarking (J2J), the input is a JPEG image file. After watermark embedding, the image is JPEG-compressed such that the output file is also a JPEG file. In this paper, we use the human visual system (HVS) model to estimate the J2J data hiding capacity of JPEG images, or the maximum number of bits that can be embedded in JPEG-compressed images. Watson’s HVS model is modif...
متن کاملStatistical Features Based Image Watermarking Resisting to Geometrical Attacks
The aim of our robust technique using watermarking is to reconstruct watermark from geometric attacks. Various geometric transformations, such as rotation, scaling, cropping, shear, translation, resize, scattering, bending, and so on, provides the displacement of some of its picture elements. The existing watermarking algorithms countermeasures the attacks related to pixel positions. In our pap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Open Automation and Control Systems Journal
سال: 2015
ISSN: 1874-4443
DOI: 10.2174/1874444301507012215