Part of the book series:Lecture Notes in Computer Science ((LNTCS,volume 3980))
Included in the following conference series:
1302Accesses
10Citations
Abstract
In this paper, a wavelet packets watermarking algorithm based on chaos encryption for still digital images is presented. The watermarking is changed into bit sequence by modular arithmetic, at the same time, a random sequence is gotten by using a chaos map and deal with it also by modular arithmetic. After getting these two sequences, we do XOR arithmetic, then getting a new encrypted watermarking sequence. At the embedding stage, wavelet packets decomposition is used for original image, then embedding encrypted watermarking sequence into some frequency bands of original image by repeatedly embedding four times. At the extracting stage, wavelet packets decomposition for original image and watermarked image are used to inverse process. The experiment results demonstrated the new algorithm is robust for scaling, cropping, JPEG compression and noise attack.
This is a preview of subscription content,log in via an institution to check access.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Coria-Mendoza, L., Nasiopoulos, P., Ward, R.: A Robust Watermarking Scheme Based on Informed Coding and Informed Embedding. In: IEEE International Conference on Image Processing ICIP 2005, Genova, Italy (2005)
Li, C.-T.: Reversible Watermarking Scheme with Image-independent Embedding Capacity. IEE Proceedings - Vision, Image, and Signal Processing 152(6), 779–786 (2005)
Ni, J.Q., Zhang, R.Y., Huang, J.W., Wang, C.T.: A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 110–123. Springer, Heidelberg (2005)
Podilchuk, C.I., Zeng, W.: Image-Adaptive Watermarking Using Visual Models. IEEE Journal on Selected Areas in Communications 16(4), 525–539 (1998)
Paquet, A., Ward, R.K., Pitas, I.: Wavelet Packets-based Digital Watermarking for Image Verification and Authentication. Signal Processing, Special Issue on Security of Data Hiding Technologies 83(10), 2117–2132 (2003)
Wang, H.J.M., Su, P.C., Kuo, C.C.J.: Wavelet-based Digital. Image Watermarking. Optics Express 3(12), 491–496 (1998)
Author information
Authors and Affiliations
Department of Computer Science, Central China Normal University, Wuhan, 430079, P.R. China
Jin Cong, Yan Jiang, Zhiguo Qu & Zhongmei Zhang
- Jin Cong
Search author on:PubMed Google Scholar
- Yan Jiang
Search author on:PubMed Google Scholar
- Zhiguo Qu
Search author on:PubMed Google Scholar
- Zhongmei Zhang
Search author on:PubMed Google Scholar
Editor information
Editors and Affiliations
Department of Computer Science, University of Calgary, 2500 University Drive N.W., T2N 1N4, Calgary, AB, Canada
Marina Gavrilova
Department of Mathematics and Computer Science, University of Perugia, via Vanvitelli, 1, I-06123, Perugia, Italy
Osvaldo Gervasi
William Norris Professor, Head of the Computer Science and Engineering Department, University of Minnesota, USA
Vipin Kumar
OptimaNumerics Ltd., Cathedral House, 23-31 Waring Street, BT1 2DX, Belfast, UK
C. J. Kenneth Tan
Clayton School of IT, Monash University, 3800, Clayton, Australia
David Taniar
Department of Chemistry, University of Perugia, Via Elce di Sotto, 8, I-06123, Perugia, Italy
Antonio Laganá
School of Computing, Soongsil University, Seoul, Korea
Youngsong Mun
School of Information and Communication Engineering, Sungkyunkwan University, Korea
Hyunseung Choo
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cong, J., Jiang, Y., Qu, Z., Zhang, Z. (2006). A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption. In: Gavrilova, M.,et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3980. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751540_100
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-540-34070-6
Online ISBN:978-3-540-34071-3
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative