Opto-Electronic Engineering, Volume. 37, Issue 2, 96(2010)
Optimization Analysis of Formulas for Quantization-based Image Watermarking
[2] [2] LI Q,COX I J. Rational dither modulation watermarking using a perceptual model [C]// Proceedings of IEEE 7th Workshop on Multimedia Signal Processing,Shanghai, China,Oct 30-Nov 2,2005:1-4.
[3] [3] LIU Tong,QIU Zheng-ding. A quantization-based image watermarking algorithm [J]. Journal on Communications,2002,23(10):89-93.
[4] [4] LI Xu-dong,ZHANG Zhen-yue. Public watermarking using matrix norm [J]. Journal of Computer-aided Design & Computer Graphics,2005,17(8):1857-1861.
[5] [5] WANG Hong-xia,HE Chen,DING Ke. Robust public watermarking based on chaotic map [J]. Journal of Software,2004,15(8):1245-1251.
[6] [6] YU Gwo-jong,LU Chun-shien,LIAO Mark Hong-yuan,et al. Mean quantization-based fragile watermarking for image authentication [J]. Optical Engineering(S0091-3286),2001,40(7):1396-1408.
[8] [8] ZHANG Zhi-yu,YU Hai-yan,ZHANG Jiu-long,et al. Digital image watermark embedding and blind extracting in the ridgelet domain [J]. Acta Electronica Sinica,2007,35(9):1804-1808.
[9] [9] LEE S,JANG D,YOO C D. An SVD-based watermarking method for image content authentication with improved security[C]// Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing,Philadelphia,Mar 18-23,2005:525-528.
[10] [10] SUN Rui,SUN Hong,YAO Tian-ren. A SVD and quantization based semi-fragile watermarking technique for image authentication [C]// Proceedings of the 6th International Conference on Signal Processing,Beijing,Aug 26-30,2002:1592-1595.
[11] [11] NIU Pan-pan,YANG Hong-ying,WU Jun,et al. Robust digital watermarking based on significant region of normalized image [J]. Journal of Image and Graphics,2007,12(10):1774-1777.
[12] [12] HU Zhi-gang,XIE Ping,ZHANG Xian-min. SVD based digital watermarking algorithm [J]. Computer Engineering,2003,17(29):162-164
[13] [13] GORODETSKI V I,POPYACK L J,SAMOILOV V,et al. SVD-based approach to transparent embedding data into digital images [J]. Lecture Notes in Computer Science(S0302-9743),2001,2052:263-274.
[14] [14] JIANG Dan,XUAN Guo-rong,YANG Cheng-yun,et al. Identity verification system using JPEG 2000 real-time quantization watermarking and fingerprint recognition [J]. Journal of Computer Applications,2005,25(8):1750-1752.
[15] [15] JIN Cong,PENG Jia-xiong. A robust wavelet-based blind digital watermarking algorithm [J]. Information Technology Journal (S1812-5638),2006,5(2):358-363.
[16] [16] SHAO Ya-fei,WU Guo-wei,LIN Xing-gang. Quantization-based digital watermarking algorithm [J]. Journal of Tsinghua University: Science and Technology,2003,43(1):20-22,58.
[17] [17] ZHAO Yan-ling,ZHENG Xiao-shi,LI Na,et al. A digital image watermark algorithm based on DC coefficients quantization[C]// Proceedings of the 6th World Congress on Intelligent Control and Automation,Dalia, China,Jun 21-23,2006:9734-9738.
[18] [18] LI Xu-dong. Analysis and improvement of formulas for evaluating similarity degree of digital watermarks [J]. Acta Automatica Sinica,2008,34(2):208-210
Get Citation
Copy Citation Text
LI Xu-dong. Optimization Analysis of Formulas for Quantization-based Image Watermarking[J]. Opto-Electronic Engineering, 2010, 37(2): 96
Category:
Received: Jul. 16, 2009
Accepted: --
Published Online: May. 28, 2010
The Author Email: Xu-dong LI (leesheedong@163.com)