Acta Photonica Sinica, Volume. 41, Issue 7, 859(2012)
A Selfembedding Image Watermarking Scheme with Dual Purpose
[1] [1] WEN Quan, SUN Tanfeng, WANG Shuxun. Concept and application of zerowatermark[J]. Acta Electronica Sinica, 2003, 31(2): 214216.
[2] [2] YE Tianyu. A robust zerowatermarking algorithm against dual printandscan process based on discrete cosine transformation [J]. Acta Photonica Sinica, 2011, 40(1): 142148.
[3] [3] YE Tianyu. A robust zerowatermark algorithm based on singular value decomposition and discreet cosine transform[C]. Communications in Computer and Information Science (CCIS), SpringerVerlag, Berlin, Heidelberg, 2011, 137: 18.
[4] [4] LIU Ruizhen, TAN Tieniu. SVD based digital watermarking method[J]. Acta Electronica Sinica, 2001, 29(2): 168171.
[5] [5] SOLANKI K, MADHOW U, MANJUNATH B S, et al. “Print and scan” resilient data hiding in images[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(4): 464478.
[6] [6] KANG Xiangui, HUANG Jiwu, ZENG Wenjun. Efficient general printscanning resilient data hiding based on uniform logpolar mapping[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 112.
[7] [7] LI Xudong. Graylevel digital watermarking algorithm based on SVD[J]. Geomatics and Information Science of Wuhan University , 2010, 35(11): 13051308, 1359.
[8] [8] LI Xudong, ZHANG Zhenyue. Twolayer partition and singular value decomposition based image watermarking [J].Journal of Zhejiang University (Engineering Science), 2006, 40(12): 20882092.
[9] [9] LI Xudong. Public watermarking using matrix norm[J].Journal of ComputerAided Design& Computer Graphics, 2005, 17(8): 18571861.
[10] [10] LI Xinwei, GUO Baolong, LI Leida. A statisticquantization based image watermarking algorithm resisting geometric attacks [J]. Journal of Optoelectronics·Laser, 2009, 20(8): 10821086.
[11] [11] XU Wenli, LI Lei, WANG Yumin. Robust digital watermarking scheme resistant to gaussian noise, geometric distortion and JPEG compression attacks[J]. Journal of Electronics & Information Technology, 2008, 30(4): 933936.
[12] [12] ZHANG Hongbin, YANG Cheng. Tamper detection and selfrecovery of images using selfembedding[J]. Acta Electronica Sinica, 2004, 32(2): 196199.
[13] [13] HE Hongjie, ZHANG Jiashu. Selfembedding watermarking algorithm with robustness against watermark information alterations[J].Journal of Software, 2009, 20(2): 437450.
[14] [14] ZHANG Xianhai, YANG Yongtian. Image authentication scheme research based on fragile watermarking[J].Acta Electronica Sinica, 2007, 35(1): 3439.
[15] [15] DING Ke, HE Chen, JIANG Lingge, et al. A fragile watermark technique based on address code[J]. Journal of Shanghai Jiaotong University, 2004, 38(4): 620623.
[16] [16] SCHLAUWEG M, PROFROCK D, PALFNER T, et al. Quantizationbased semifragile publickey watermarking for secure image authentication[C]. SPIE, 2005, 5915: 4151.
[17] [17] LI Chun, HUANG Jiwu. A semifragile image watermarking resisting to JPEG [J].Journal of Software, 2006, 17(2): 315324.
[18] [18] NIKOLAIDIS A, PITAS I. Asymptotically optimal detection for additive watermarking in the DCT and DWT domains[J].IEEE Transactions on Image Processsing, 2003, 12(5): 563571.
[19] [19] CHENG Q, HUANG T S. Robust optimum detection of transform domain multiplicative watermarks[J].IEEE Transactions on Signal Processing, 2003, 51(4): 906924.
Get Citation
Copy Citation Text
YE Tianyu. A Selfembedding Image Watermarking Scheme with Dual Purpose[J]. Acta Photonica Sinica, 2012, 41(7): 859
Received: Dec. 1, 2011
Accepted: --
Published Online: Aug. 31, 2012
The Author Email: Tianyu YE (flystu008@yahoo.com.cn)