cho em xin tài liệu này
http://ieeexplore.ieee.org/iel5/7417...arnumber=93201
A blind watermarking technique using wavelet transform
Ikpyo Hong; Intaek Kim; Seung-Soo Han
Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International Symposium on
Volume 3, Issue , 2001 Page(s):1946 - 1950 vol.3
Digital Object Identifier 10.1109/ISIE.2001.932010
Summary:In this paper, we propose an effective watermarking algorithm for copyright protection. This is a blind watermarking which can confirm the copyright without the original image. The original image is transformed using wavelet transform and flags are created with the secret key. The secret key is the thing we need to extract the flags and compare the extracted flags with the original flags that are created during the watermark embedding procedure. To criticize the robustness of this scheme we compared the extracted flag with the original flag after several attacks such as JPEG compression, collusion, resize and noise addition. The results show that the proposed watermarking algorithm has excellent robustness against various watermark attacks with the high quality of the watermarked image
http://ieeexplore.ieee.org/iel5/7417...arnumber=93201
A blind watermarking technique using wavelet transform
Ikpyo Hong; Intaek Kim; Seung-Soo Han
Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International Symposium on
Volume 3, Issue , 2001 Page(s):1946 - 1950 vol.3
Digital Object Identifier 10.1109/ISIE.2001.932010
Summary:In this paper, we propose an effective watermarking algorithm for copyright protection. This is a blind watermarking which can confirm the copyright without the original image. The original image is transformed using wavelet transform and flags are created with the secret key. The secret key is the thing we need to extract the flags and compare the extracted flags with the original flags that are created during the watermark embedding procedure. To criticize the robustness of this scheme we compared the extracted flag with the original flag after several attacks such as JPEG compression, collusion, resize and noise addition. The results show that the proposed watermarking algorithm has excellent robustness against various watermark attacks with the high quality of the watermarked image
Comment