Watermarking Based on Complemented MLCA and 2D CAT
نویسندگان
چکیده
منابع مشابه
Watermarking Based on Complemented MLCA and 2D CAT
— Digital watermarking has gained importance in recent years in copyright protection and multimedia. This paper proposes a secure and novel watermarking system based on complemented Maximum Length Cellular Automata (MLCA) and Two-Dimension Cellular Automata Transform (2D CAT). In this watermarking scheme, the original watermark is first encrypted by complemented MLCA with the private keys, and ...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملResearch on Color Watermarking Algorithm Based on RDWT-SVD
In this paper, a color image watermarking algorithm based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) is proposed. The new algorithm selects blue component of a color image to carry the watermark information since the Human Visual System (HVS) is least sensitive to it. To increase the robustness especially towards affine attacks, RDWT is adopted for its...
متن کاملwatermarking scheme based on multiple chaotic maps
a watermarking scheme for grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. jacobian elliptic mapis employed to encrypt ofwatermarked logo. piecewise nonlinear chaotic map is also usedto determine the location of dct coefficients for the watermarkembedding. the purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملLow Frequency Component-Based Watermarking Scheme using 2D Datamatrix
A robust watermark should be able to withstand most image manipulations such as cropping, additive noise and JPEG type compressions. It should also be able to hold telltale signs of attacks that are unknown to the user. Both of these aims can be fulfilled by embedding two watermarks, one fragile and one robust in different domains where watermarks are not vulnerable to the aforementioned manipu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of information and communication convergence engineering
سال: 2011
ISSN: 2234-8255
DOI: 10.6109/jicce.2011.9.2.212