TY - GEN
T1 - A Robust Multiple Watermarking Scheme for Still Image using DWT, DCT and Spread Spectrum
AU - Chen, Wen Yuan
AU - Chen, Chin Hsing
AU - Lin, Jzau Sheng
PY - 2002
Y1 - 2002
N2 - In this paper, the spread spectrum (SS) and discrete wavelet transform (DWT), discrete cosine transform (DCT) are used to construct a robust multiple image watermarking scheme. The wavelet decomposition algorithm subdivided the frequency of the host image into low-low, low-high, high-low, high-high frequency bands. However, the low-low frequency band is the most important band, because the energy of the image is concentrated within it. Further we let the low-low band transfer by DCT, then the watermarks bits stream modulated by SS are concealed into those coefficients of DCT block. Before embedding, the watermarks are chaotic by toral automorphism firstly then rearrange into bits stream. While the SS processing, the pseudo-random number (PN) sequence is employed to finish the job. From experiment results shown that our proposed scheme is robust, imperceptible, unambiguous, and non-removable under attacks such as JPEG lossy compression, cropping, rotation, painting, and resizing.
AB - In this paper, the spread spectrum (SS) and discrete wavelet transform (DWT), discrete cosine transform (DCT) are used to construct a robust multiple image watermarking scheme. The wavelet decomposition algorithm subdivided the frequency of the host image into low-low, low-high, high-low, high-high frequency bands. However, the low-low frequency band is the most important band, because the energy of the image is concentrated within it. Further we let the low-low band transfer by DCT, then the watermarks bits stream modulated by SS are concealed into those coefficients of DCT block. Before embedding, the watermarks are chaotic by toral automorphism firstly then rearrange into bits stream. While the SS processing, the pseudo-random number (PN) sequence is employed to finish the job. From experiment results shown that our proposed scheme is robust, imperceptible, unambiguous, and non-removable under attacks such as JPEG lossy compression, cropping, rotation, painting, and resizing.
UR - http://www.scopus.com/inward/record.url?scp=1642390032&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=1642390032&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:1642390032
SN - 0970789017
T3 - Proceedings of the Joint Conference on Information Sciences
SP - 668
EP - 671
BT - Proceedings of the 6th Joint Conference on Information Sciences, JCIS 2002
A2 - Caulfield, J.H.
A2 - Chen, S.H.
A2 - Cheng, H.D.
A2 - Duro, R.
A2 - Caufield, J.H.
A2 - Chen, S.H.
A2 - Cheng, H.D.
A2 - Duro, R.
A2 - Honavar, V.
T2 - Proceedings of the 6th Joint Conference on Information Sciences, JCIS 2002
Y2 - 8 March 2002 through 13 March 2002
ER -