Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Research Article
A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model

Tzung-Her Chen, Gwoboa Horng and Sang-Hao Wang

Information Technology Journal, 2003, 2(3), 213-230.

Abstract

In this paper, a highly robust watermarking scheme based on Discrete Wavelet Transform (DWT) is proposed. It has the following features. First, unlike conventional proposed watermarking techniques, a watermark is embedded into the lowest frequency components. Second, the Human Visual System (HVS) model is adopted to improve the transparency of the watermarked image. Several experiments are conducted to demonstrate the robustness property of this watermarking scheme. Furthermore, it is worthwhile to mention that the proposed scheme is resistant to the counterfeiting attack. In addition, comparison of the proposed scheme with other state-of-the-art watermarking schemes based on DWT shows that our scheme is more effective.

ASCI-ID: 28-137

Cited References Fulltext

Related Articles


Secure Implementation of Message Digest, Authentication and Digital Signature

Information Technology Journal, 2005, 4(3), 204-221.

A Robust Framework for Protecting Computation Results of Mobile Agents

Information Technology Journal, 2008, 7(1), 24-31.

Encryption Algorithm of RSH (Round Sheep Hash)

Information Technology Journal, 2011, 10(3), 686-690.

Security Analysis of Practical Anonymous User Authentication Scheme with Security Proof

Information Technology Journal, 2013, 12(3), 522-525.

Analysis and Research of the RSA Algorithm

Information Technology Journal, 2013, 12(9), 1818-1824.

Unconditionally Secure Public-key Cryptosystem using Entangled Quantum States

Information Technology Journal, 2013, 12(16), 3820-3824.

Elliptic Curve ElGamal Encryption and Signature Schemes

Information Technology Journal, 2005, 4(3), 299-306.

Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain

Information Technology Journal, 2010, 9(3), 460-466.

A Visible Watermarking Scheme in Spatial Domain Using HVS Model

Information Technology Journal, 2010, 9(8), 1622-1628.

The Watermarking Algorithm against Shearing Based on Dopplerlet-radon Transformation

Information Technology Journal, 2012, 11(3), 349-353.

A Robust Blind Image Watermarking Based on Generalized Gaussian Distribution

Information Technology Journal, 2014, 13(7), 1427-1430.

A Robust Wavelet-based Blind Digital Watermarking Algorithm

Information Technology Journal, 2006, 5(2), 358-363.

Cited By


Encryption Algorithm of RSH (Round Sheep Hash)

Information Technology Journal, 2011, 10(3), 686. DOI: 10.3923/itj.2011.686.690

Using Watermarking Techniques to prove Rightful Ownership of Web Images

International Journal of Information Technology and Web Engineering, 2011, 6(2), 29. DOI: 10.4018/jitwe.2011040103

Digital watermarking techniques for image security: a review

Journal of Ambient Intelligence and Humanized Computing, 2019, (), . DOI: 10.1007/s12652-019-01500-1

Steganography in discrete wavelet transform based on human visual system and cover model

Multimedia Tools and Applications, 2019, 78(13), 18475. DOI: 10.1007/s11042-019-7238-8