摘要(英) |
In this thesis, we propose a novel watermarking system that is highly robust against attacks without perceptible image degradation. In addition, the original image is not needed in watermark extraction. It operates either in the DWT domain or the DCT domain. This system integrates three important ideas to provide extellent watermarking performance.
The first idea is to use a secret key that is generated based on the watermark logo and the host image. Based on the polarity of the transform coefficients and the key, the original watermark can accurately be extracted.
The second idea is to use subblock composition to filter out frequency transform blocks that are not suitable for watermark embedding. A Tri-state Exclusive-Or (TXOR) operator is then applied in qualified subblock to embed the watermark. This technique further improves the robustness.
The third idea is the deadzone shifting with human visual system. For watermark embedded transform blocks, if the coefficients are near the threshold, they will be shifted toward two ends so that the embedded watermark is not noticeable but more robust.
With the integration of the above three state-of-art techniques, the resulting watermarking system has excellent performance. Simulation results confirm that the proposed system is extremely robust against cropping, JPEG, JPEG2000, and SPIHT compression. |
參考文獻 |
[1] S. G. Miaou, and C. Z. Chen, "A Robust Image Watermarking Technique Based on Wavelet Transform and Human Visual Systems," (Invited Paper) Submitted to J. of Computers (Nov. 2000).
[2] C. F. Wu, W. S. Hsieh, " Digital watermarking using zerotree of DCT ,"Consumer Electronics, IEEE Transactions on Volume: 46 1 , Feb. 2000 , Page(s): 87 -94
[3] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum
watermarking for multimedia, " IEEE Trans. Image Processing, vol. 6 pp.
1673-1687, Dec. 1997.
[4] J. Lee and C. S. Won, "Authentication and correction of digital watermarking images, "Electronics Letters, Vol. 35, No. 11, p. 886-887, 27th May. 1999.
[5] J. Huang, Y. Q. Shi, "Adaptive image watermarking scheme based on visual masking" Electronics Letters Volume: 34 8 , 16 April 1998 , Page(s): 748 -750
[6] C. T. Hsu, J. L. Wu, "Hidden digital watermarks in images" Image Processing, IEEE Transactions on Volume: 8 1 , Jan. 1999 , Page(s): 58 -68
[7] S. G. Miaou,and C. M. Chen, "A Key-Box Image Watermarking Technique for Copyright Prptection," (Invited Paper) Submitted to IEICE Trans. Fundamentals Communications Electronics Information and Systems (Dec. 2000).
[8] M. Antonini, M. Barlaud, P. Mathieu, and I. Daubechies, "Image Coding Using
Wavelet Transform," IEEE Trans. Image Processing, vol. 1, no. 2, Apr. 1992.
[9] C. S. Burrus﹐ R. A. Gopinath, and H. Guo, Introduction to wavelets and wavelet
Transforms - A primer, New Jersey, Prentice-Hall﹐1998
[10] G. Strang and T. Nguyen, Wavelets and Filter Banks, Wellesley-Cambridge
Press,1996
[11] Z. H. Wei, P. Qin, Y.Q. Fu, "Perceptual digital watermark of images using wavelet transform," Consumer Electronics, IEEE Transactions on
Volume: 44 4 , Nov. 1998 , Page(s): 1267 -1272
[12] M. J. Tsai; K. Y. Yu; Y.Z. Chen , "Joint wavelet and spatial transform for digital watermark," ICIP2000 proceedings
[13] G. Voyatzis, I. Pitas, "Appaliciations of toral automorphisms in image watermarking,"Image Processing, 1996. Proceedings., International
Conference on Volume.1 , 1996 , Page(s): 237 -240 vol.2 |