scispace - formally typeset
Book ChapterDOI

A Novel Chaos Based Robust Watermarking Framework

Reads0
Chats0
TLDR
A novel logo watermarking framework is proposed using non-linear chaotic map to generate keys to be used in the embedding process, which reveals the efficiency and robustness of the proposed framework.
Abstract
In this paper, a novel logo watermarking framework is proposed using non-linear chaotic map. The essence of proposed technique is to use chaotic map to generate keys to be used in the embedding process. Therefore, a method for generating keys is first proposed followed by the embedding process. A robust extraction process is then proposed to verify the presence of watermark from the possibly attacked watermarked image. Experimental results and attack analysis reveal the efficiency and robustness of the proposed framework.

read more

Citations
More filters
Journal ArticleDOI

A new robust watermarking system in integer DCT domain

TL;DR: The experimental results demonstrate that the proposed scheme is imperceptible and robust against a variety of intentional or unintentional attacks.
Proceedings ArticleDOI

A robust watermarking scheme based on image normalization

TL;DR: A new image watermarking framework for copyright protection is presented using image normalization, singular value decomposition (SVD) and dynamic stochastic resonance (DSR) to improve the robustness of the system.
Journal ArticleDOI

A simplified watermarking algorithm based on lifting wavelet transform

TL;DR: A new blind image watermarking scheme using binary decimal sequence (d-sequence) and lifting wavelet transform (LWT) for copyright protection and the better robustness of the proposed scheme against different kind of attacks is demonstrated.
Journal ArticleDOI

A robust blind watermarking framework based on Dn structure

TL;DR: A new robust watermarking framework is designed using the discrete cosine transform (DCT), binary decimal sequence (d-sequence) and Dn-structure to generate a binary d-sequence based on random number generator (RNG) and some secret keys.
Proceedings ArticleDOI

Schur and DCT Decomposition Based Medical Images Watermarking

TL;DR: The main idea is the embedding of the watermark in the DCT middle band coefficient of the cover image blocks, after carrying out the Schur decomposition on the image's blocks, which ensures strong robustness and good imperceptibility.
References
More filters
Book

Information Hiding Techniques for Steganography and Digital Watermarking

TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Journal ArticleDOI

Rotation, scale and translation invariant spread spectrum digital image watermarking

TL;DR: In this paper, a Fourier-Mellin-based approach is used to construct watermarks which are designed to be unaffected by any combination of rotation and scale transformations, and a novel method of CDMA spread spectrum encoding is introduced which allows one to embed watermark messages of arbitrary length and which need only a secret key for decoding.
Journal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

TL;DR: The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Book ChapterDOI

8 – Robust Watermarking

TL;DR: This chapter analyzes the effects of some valumetric distortions, which can often be modeled as combinations of additive noise, amplitude changes, linear filtering, and/or quantization to occur to photographs, music, and video.
Journal ArticleDOI

Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms

TL;DR: The performance of a fragile watermarking method based on discrete cosine transform (DCT) has been improved in this paper by using intelligent optimization algorithms (IOA), namely genetic algorithm, differential evolution algorithm, clonal selection algorithm and particle swarm optimization algorithm.
Related Papers (5)