CN101645162A - Printing-scanning resistance zero-watermarking algorithm - Google Patents

Printing-scanning resistance zero-watermarking algorithm Download PDF

Info

Publication number
CN101645162A
CN101645162A CN200910092276A CN200910092276A CN101645162A CN 101645162 A CN101645162 A CN 101645162A CN 200910092276 A CN200910092276 A CN 200910092276A CN 200910092276 A CN200910092276 A CN 200910092276A CN 101645162 A CN101645162 A CN 101645162A
Authority
CN
China
Prior art keywords
printing
module
zero
scanning
watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910092276A
Other languages
Chinese (zh)
Inventor
叶天语
马兆丰
钮心忻
杨义先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN200910092276A priority Critical patent/CN101645162A/en
Publication of CN101645162A publication Critical patent/CN101645162A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

A printing-scanning process relates to D/A and A/D double conversation which brings about interferences such as random noise addition, cutting, scaling, rotating and the like; therefore, a printing-scanning attacked resistance digital watermarking algorithm has very high requirement on the robustness. Aiming at the problems, the invention provides a printing-scanning resistance zero-watermarking algorithm by utilizing energy aggregation effect of discrete wavelet transformation low frequency approximation sub-band and singular value stability of singular value decomposition. Partitioning singular value decomposition is carried out on a discrete wavelet transformation low frequency approximation sub-band of an original image; and zero watermarking is generated by judging the size relationship of maximum singular values of two adjacent sub-blocks. The invention can resist printing-scanning attack.

Description

A kind of printing-scanning resistance zero-watermarking algorithm
Technical field
The present invention relates to a kind of field of multimedia signal processing, especially the digital image copyright protection field.The invention provides a kind of printing-scanning resistance zero-watermarking algorithm, the digital picture of needs experience printing-scanning attack is carried out copyright protection.
Background technology
Along with Internet development, increasing digital product wide-scale distribution on network.In many occasions, the digital picture on the network need be printed and rescan into digital picture after treatment again and on network, propagate.How the digital picture of needs experience printing-scanning process is carried out copyright protection and just become a problem of being badly in need of solution.Printing-scanning relates to D/A and twice conversion of A/D, can bring interference such as adding random noise, shearing, convergent-divergent, rotation.The digital watermarking algorithm of anti-printing-scanning requires that these a series of attacks are all had very high robustness.The watermarking algorithm of the anti-printing-scanning attack of research has very high theoretical research and actual application value.
Up to the present, the robustness of most digital watermarking algorithms is not also enough resisted printing-scanning attack, and the digital watermarking algorithm that can resist printing-scanning attack is actually rare.Consult data of literatures, domestic researcher has roughly proposed the digital watermarking algorithm of following anti-printing-scanning attack at present, sees the listed list of references in end, this part.People such as Niu Shaozhang, Wu Hongtao [1] classifies to the discrete cosine transform domain coefficient, by sign quantitaes watermark information in every class.People [2] such as Niu Shaozhang, button heart Xin are by adjusting the order embed watermark information of discrete cosine transform domain intermediate frequency coefficient, utilize the maximum membership grade principle of Fuzzy Pattern Recognition to differentiate watermark information twice during extraction.People such as Sun Yunfeng, Zhai Hongchen [3] utilizes the coloured image digital watermarking system of a kind of anti-printing of Fourier's calculation holographic technical design-scanning, has bigger watermark and embeds capacity.Because the Walsh function has strict orthogonal, people such as Ge Yunlu, Nian Guijun [4] at first utilizes the Walsh function that original watermark is carried out coded modulation, approach the sub-band adaptive embed watermark information in conjunction with human-eye visual characteristic at the wavelet transform low frequency then, realize the embedding and the extraction of the meaningful watermark information of high capacity.People [5] such as Tan is just discussing, Zhu Ningbo propose a kind of anti-printing-scanning digital digital watermark that is applicable to file and picture, by adjusting the wavelet transform territory detail subbands sign quantitaes watermark information of file and picture piece.Seek the forward and backward maintenance as far as possible of digital picture printing-scanning and stablize the crucial part that constant characteristic quantity is this type of algorithm of design.
The wavelet transform low frequency approaches most energy that subband has been assembled original image, has stronger anti-interference stability than other three detail subbands.The singular value that obtains after svd disturbance to external world has good stability.Zero watermarking algorithm often utilizes the invariant feature of initial carrier to produce zero watermark, effectively solves the contradiction between invisibility and the robustness.The key that zero watermarking algorithm has strong robustness is that the characteristic quantity that is utilized has stiff stability to external interference.The present invention utilizes the wavelet transform low frequency to approach the energy accumulating effect of subband and the singular value stability of svd; propose a kind of printing-scanning resistance zero-watermarking algorithm, be intended to realize the digital picture of needs experience printing-scanning attack is carried out copyright protection.
List of references
[1] Niu Shaozhang, Wu Hongtao thanks to trace, Liu Xin, Yang Yixian. the robustness of anti printing and scanning digital watermarking algorithm [J]. and Zhongshan University's journal (natural science edition), 2004,43 (supplementary issue 2): 1-4.
[2] Niu Shaozhang, button heart Xin, Yang Yixian, Hu Wenqing. Data Hiding Algorithm for Halftone Images [J]. electronic letters, vol, 2004,32 (7): 1180-1183.
[3] Sun Yunfeng, Zhai Hongchen, Yang Xiaoping, Wang Mingwei. the application [J] of Fourier calculation holographic digital watermarking in the coloured image antiforge. photoelectron. laser, 2008,19 (7): 952-955.
[4] Ge Yunlu, Nian Guijun, Wang Shuxun. based on the code modulated anti printing and scanning digital watermarking algorithm of Walsh [J]. Southeast China University's journal (natural science edition), 2007,37 (supplementary issue I): 197-200.
[5] Tan is just discussing, Zhu Ningbo, Sun Xingming. based on the anti-printing-scanning digital digital watermark [J] of file and picture. and computer utility research, 2007,24 (12): 199-200,265.
Summary of the invention
The purpose of this invention is to provide a kind of printing-scanning resistance zero-watermarking algorithm, the digital picture of needs experience printing-scanning attack is carried out copyright protection so that realize.
For reaching this purpose, the present invention utilizes the wavelet transform low frequency to approach the energy accumulating effect of subband and the singular value stability of svd, designs a kind of printing-scanning resistance zero-watermarking algorithm.Copyright authentication process flow diagram of the present invention comprises following six kinds of modules:
A, zero watermark generation module;
B, post-processing module;
C, zero watermark extracting module;
D, similarity evaluation module;
E, threshold value are provided with module;
F, copyright ownership judge module.
Modules A comprises following content:
Original image carries out n layer scattering wavelet transformation, and n layer low frequency approximator band is carried out the piecemeal svd, produces zero watermark w by the magnitude relationship of judging two adjacent sub-blocks maximum singular values.
Module B further comprises following content:
The digital picture of printing-scanning back input is carried out operations such as cutting, rotation correction, adjustment image sampling resolution, adjustment image size
Module C comprises following content:
N layer scattering wavelet transformation low frequency approximator band to input picture carries out the piecemeal svd, extracts zero watermark w ' by the magnitude relationship that compares two adjacent sub-blocks maximum singular values.
Module D comprises following content:
Similarity s between the zero watermark sequence w ' of original zero watermark sequence w and extraction is defined as:
s = 1 - ( Σ j = 1 K / 2 w j w j ′ ) / ( K / 2 ) , Wherein
Figure G2009100922766D00032
Be XOR.The similarity evaluation module is used for weighing the correlativity between the different sequences.
Module E further comprises following content:
According to initial zero watermark and lock-out attack the similarity between zero watermark of extracting the back, initial zero watermark and at random 0, the similarity setting threshold th between the 1} sequence.
Module F further comprises following content:
Similarity and threshold decision copyright ownership according to forward and backward zero watermark of digital picture printing-scanning.
The present invention realizes that for the digital picture of experience printing-scanning attack copyright protection provides a new way.Wavelet transform low frequency approximator band to original image carries out the piecemeal svd, produces zero watermark by the magnitude relationship of judging two adjacent sub-blocks maximum singular values.Behind digital picture experience printing-scanning attack, similarity that still can be higher is extracted zero watermark, thereby can carry out copyright protection to the digital picture of experience printing-scanning attack.
Description of drawings
Fig. 1 is the copyright authentication process flow diagram;
Among Fig. 2, (a) be original Lena image; (b) be original Peppers image; (c) be original Baboon image;
Among Fig. 3, (a) be the zero watermark of Lena image with at random 0, the similarity between the 1} sequence; (b) be the zero watermark of Peppers image with at random 0, the similarity between the 1} sequence; (c) be the zero watermark of Baboon image with at random 0, the similarity between the 1} sequence;
Among Fig. 4, (a) be the Lena image of experience printing-scanning attack and aftertreatment; (b) be the Peppers image of experience printing-scanning attack and aftertreatment; (c) be the Baboon image of experience printing-scanning attack and aftertreatment.
Embodiment
Below in conjunction with drawings and Examples description is done into-gone on foot to technical scheme of the present invention.
Fig. 1 is the copyright authentication process flow diagram, comprises following process:
(1) zero watermark produces
Original image carries out n layer scattering wavelet transformation, and n layer low frequency approximator band is carried out the piecemeal svd, produces zero watermark w by the magnitude relationship of judging two adjacent sub-blocks maximum singular values.If that is: σ 2 × j - 1 1 ≥ σ 2 × j 1 , W then j=0; Otherwise, w j=1 ( j = 1,2 , L , K 2 ) . Wherein, σ t 1Be the maximum singular value of t sub-piece, w jBe the j bit watermark of w, K is sub-piece sum.Preserve initial zero watermark, be used for similarity evaluation module one, two, three and calculate similarity between it and other sequences.
(2) aftertreatment
The digital picture of printing-scanning back input is carried out operations such as cutting, rotation correction, adjustment image sampling resolution, adjustment image size, for the zero watermark behind the extraction printing-scanning attack is prepared.
(3) zero watermark extracting
N layer scattering wavelet transformation low frequency approximator band to input picture carries out the piecemeal svd, extracts zero watermark w ' by the magnitude relationship that compares two adjacent sub-blocks maximum singular values.If that is: σ 2 × j - 1 ′ 1 ≥ σ 2 × j ′ 1 , W ' then j=0; Otherwise, w ' j=1 (j=1,2, L, K/2).Zero watermark extracting module has two: module one is used for from suffering that the image that lock-out is attacked extracts watermark sequence; Module two be used for from printed-image of scanning attack extracts watermark sequence.
(4) similarity evaluation
Similarity s between the zero watermark sequence w ' of original zero watermark sequence w and extraction is defined as: s = 1 - ( Σ j = 1 K / 2 w j ⊕ w j ′ ) / ( K / 2 ) , Wherein
Figure G2009100922766D00055
Be XOR.The similarity evaluation module has three: module one is used for weighing the correlativity between the zero watermark of extracting after initial zero watermark and the lock-out attack, and the robustness that evaluation algorithms opposing lock-out is attacked provides reference for threshold value is set; Module two is used for weighing initial zero watermark with { 0, the correlativity between the 1} sequence provides reference for threshold value is set at random; Module three is used for weighing the correlativity between the zero watermark of extracting behind initial zero watermark and the printing-scanning attack, and the robustness of evaluation algorithms opposing printing-scanning attack is for judging that copyright ownership provides reference.
(5) threshold value setting
Initial zero watermark that calculates according to similarity evaluation module one and lock-out attack initial zero watermark that similarity, similarity evaluation module two between zero watermark of extracting the back calculate and at random 0, the similarity setting threshold th between the 1} sequence.
(6) copyright ownership is judged
The threshold decision copyright ownership that similarity between the zero watermark of extracting behind initial zero watermark that calculates according to similarity evaluation module three and the printing-scanning attack and threshold value are provided with module settings.When s greater than threshold value th, copyright ownership is in the plaintiff.
Embodiment:
Lena, Peppers, Baboon are that size is 512 * 512 256 grey-level standard images, have different textures, see Fig. 2 (a)-(c) respectively.Image is carried out 3 layer scattering wavelet transformations, is wavelet basis with the harr small echo, and the branch block size that low frequency approaches subband is 2 * 2, and zero watermark sequence length is 512 bits.Weigh vision difference between original image and the attack graph picture with PSNR, with similarity s weigh original zero watermark with at random 0,1} sequence and attack correlativity between the zero watermark of back extraction.
(1) robustness of opposing lock-out attack
1) rotation is attacked
Experiment parameter setting and the results are shown in Table 1.
Table 1 rotation
Figure G2009100922766D00061
2) the skew ranks are attacked
Offset column is meant that entire image moves right to the right, and originally several row of rightmost shift out and lose, and several row completions of the Far Left of vacating are black.Experiment parameter setting and the results are shown in Table 2.
Table 2 is offset column to the right
Figure G2009100922766D00062
Downward bias is divided a word with a hyphen at the end of a line and is meant that entire image moves down, and several bottom originally row shift out to be lost, and several capable completions in the top of vacating are black.Experiment parameter setting and the results are shown in Table 3.
Table 3 downward bias is divided a word with a hyphen at the end of a line
Figure G2009100922766D00071
3) attack at random deletes both in the middle of
Middle delete columns at random is meant from the right first row of deleted row and begins to be moved to the left by row that several row completions of the rightmost of vacating are black.Experiment parameter setting and the results are shown in Table 4.
The middle delete columns at random of table 4
Figure G2009100922766D00072
The middle row of deletion at random is meant from bottom's first row beginning of deleted row and moves up line by line that several bottom capable completions of vacating are black.Experiment parameter setting and the results are shown in Table 5.
Delete row in the middle of the table 5 at random
Figure G2009100922766D00073
4) size scaling
Experiment parameter setting and the results are shown in Table 6.
Table 6 size scaling
Figure G2009100922766D00074
According to table 1-6, for the image of Lena, Peppers, Baboon three width of cloth different texture, algorithm is attacked several lock-outs all has very strong robustness.
(2) threshold value setting
Produce 99 at random and obey equally distributed { 0, the 1} sequence, calculate respectively zero watermark that Lena, Peppers, Baboon three width of cloth images produce and these 0, the similarity between the 1} sequence, the results are shown in Figure 3 (a)-(c), wherein the 50th sequence is the zero watermark that three width of cloth images produce separately.According to Fig. 3 (a)-(c), the zero watermark that three width of cloth images produce and these 0, near mostly fluctuation within a narrow range 0.5 of the similarity between the 1} sequence.Opposing lock-out in conjunction with 3.1 parts is attacked experimental result, and we select 0.75 as threshold value th.
(3) robustness of opposing printing-scanning attack
At first use model digital picture to be printed on common printer paper as the laser printer of Canon L11121E; Use the scanner scanning input of model as CanoScan LiDE 100 then, resolution is set to 400dpi; Then the digital picture of scanning input is carried out aftertreatment, comprise and use Photoshop software that digital picture is carried out cutting and rotation correction, the sampling resolution of image is readjusted into 72dpi, used the bilinear method of interpolation that the image size is readjusted into 512 * 512 etc.Digital picture through printing-scanning, aftertreatment is seen Fig. 4 (a)-(c) respectively.PSNR between they and the original image is respectively 19.3572,18.0845,15.7371, and the similarity between zero watermark is respectively 0.8672,0.8691,0.8594, therefore thinks that the present invention can resist printing-scanning attack.

Claims (7)

1, a kind of printing-scanning resistance zero-watermarking algorithm is used for the copyright authentication field that needs experience the digital picture of printing-scanning attack, comprises following six kinds of modules:
A, zero watermark generation module;
B, post-processing module;
C, zero watermark extracting module;
D, similarity evaluation module;
E, threshold value are provided with module;
F, copyright ownership judge module.
2, a kind of printing-scanning resistance zero-watermarking algorithm according to claim 1, modules A further comprises following content:
Original image carries out n layer scattering wavelet transformation, and n layer low frequency approximator band is carried out the piecemeal svd, produces zero watermark w by the magnitude relationship of judging two adjacent sub-blocks maximum singular values.If that is: σ 2 × j - 1 1 ≥ σ 2 × j 1 , W then j=0; Otherwise, w j = 1 ( j = 1,2 , L , K 2 ) . Wherein, σ t 1Be the maximum singular value of t sub-piece, w jBe the j bit watermark of w, K is sub-piece sum.Preserve initial zero watermark, be used for similarity evaluation module one, two, three and calculate similarity between it and other sequences.
3, a kind of printing-scanning resistance zero-watermarking algorithm according to claim 1, module B further comprises following content:
The digital picture of printing-scanning back input is carried out operations such as cutting, rotation correction, adjustment image sampling resolution, adjustment image size, for the zero watermark behind the extraction printing-scanning attack is prepared.
4, a kind of printing-scanning resistance zero-watermarking algorithm according to claim 1, module C further comprises following content:
N layer scattering wavelet transformation low frequency approximator band to input picture carries out the piecemeal svd, extracts zero watermark w ' by the magnitude relationship that compares two adjacent sub-blocks maximum singular values.If that is: σ 2 × j - 1 ′ 1 ≥ σ 2 × j ′ 1 , W ' then j=0; Otherwise, w ' j=1 (j=1,2, L, K/2).Zero watermark extracting module has two: module one is used for from suffering that the image that lock-out is attacked extracts watermark sequence; Module two be used for from printed-image of scanning attack extracts watermark sequence.
5, a kind of printing-scanning resistance zero-watermarking algorithm according to claim 1, module D further comprises following content:
Similarity s between the zero watermark sequence w ' of original zero watermark sequence w and extraction is defined as:
s = 1 - ( Σ j = 1 K / 2 w j ⊕ w j ′ ) / ( K / 2 ) , Wherein
Figure A2009100922760003C3
Be XOR.The similarity evaluation module has three: module one is used for weighing the correlativity between the zero watermark of extracting after initial zero watermark and the lock-out attack, and the robustness that evaluation algorithms opposing lock-out is attacked provides reference for threshold value is set; Module two is used for weighing initial zero watermark with { 0, the correlativity between the 1} sequence provides reference for threshold value is set at random; Module three is used for weighing the correlativity between the zero watermark of extracting behind initial zero watermark and the printing-scanning attack, and the robustness of evaluation algorithms opposing printing-scanning attack is for judging that copyright ownership provides reference.
6, a kind of printing-scanning resistance zero-watermarking algorithm according to claim 1, module E further comprises following content:
Initial zero watermark that calculates according to similarity evaluation module one and lock-out attack initial zero watermark that similarity, similarity evaluation module two between zero watermark of extracting the back calculate and at random 0, the similarity setting threshold th between the 1} sequence.
7, a kind of printing-scanning resistance zero-watermarking algorithm according to claim 1, module G further comprises following content:
The threshold decision copyright ownership that similarity between the zero watermark of extracting behind initial zero watermark that calculates according to similarity evaluation module three and the printing-scanning attack and threshold value are provided with module settings.When s greater than threshold value th, copyright ownership is in the plaintiff.
CN200910092276A 2009-09-09 2009-09-09 Printing-scanning resistance zero-watermarking algorithm Pending CN101645162A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910092276A CN101645162A (en) 2009-09-09 2009-09-09 Printing-scanning resistance zero-watermarking algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910092276A CN101645162A (en) 2009-09-09 2009-09-09 Printing-scanning resistance zero-watermarking algorithm

Publications (1)

Publication Number Publication Date
CN101645162A true CN101645162A (en) 2010-02-10

Family

ID=41657041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910092276A Pending CN101645162A (en) 2009-09-09 2009-09-09 Printing-scanning resistance zero-watermarking algorithm

Country Status (1)

Country Link
CN (1) CN101645162A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101847409A (en) * 2010-03-25 2010-09-29 北京邮电大学 Voice integrity protection method based on digital fingerprint
CN101853483A (en) * 2010-04-30 2010-10-06 北京航空航天大学 Printing and scanning resilient watermarking method based on mathematical modeling
CN102063696A (en) * 2011-01-11 2011-05-18 浙江工商大学 Printing anti-counterfeiting watermarking algorithm based on norm and norm mean comparison
CN102129659A (en) * 2011-03-17 2011-07-20 浙江工商大学 Robust zero-watermarking algorithm based on singular value decomposition, Harr wavelet transformation and mean value calculation
CN102890814A (en) * 2012-11-06 2013-01-23 中国科学院自动化研究所 Watermark embedding and extracting method
CN113393360A (en) * 2021-06-08 2021-09-14 陕西科技大学 Correction method for printing and scanning resistant digital watermark image

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1447233A (en) * 2003-01-23 2003-10-08 同济大学 Multi-media data protection method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1447233A (en) * 2003-01-23 2003-10-08 同济大学 Multi-media data protection method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈晨 等: "基于奇异值的DWT域公开零水印技术", 《通信学报》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101847409A (en) * 2010-03-25 2010-09-29 北京邮电大学 Voice integrity protection method based on digital fingerprint
CN101853483A (en) * 2010-04-30 2010-10-06 北京航空航天大学 Printing and scanning resilient watermarking method based on mathematical modeling
CN102063696A (en) * 2011-01-11 2011-05-18 浙江工商大学 Printing anti-counterfeiting watermarking algorithm based on norm and norm mean comparison
CN102129659A (en) * 2011-03-17 2011-07-20 浙江工商大学 Robust zero-watermarking algorithm based on singular value decomposition, Harr wavelet transformation and mean value calculation
CN102890814A (en) * 2012-11-06 2013-01-23 中国科学院自动化研究所 Watermark embedding and extracting method
WO2014071714A1 (en) * 2012-11-06 2014-05-15 中国科学院自动化研究所 Watermark embedding and extracting method
CN102890814B (en) * 2012-11-06 2014-12-10 中国科学院自动化研究所 Watermark embedding and extracting method
CN113393360A (en) * 2021-06-08 2021-09-14 陕西科技大学 Correction method for printing and scanning resistant digital watermark image
CN113393360B (en) * 2021-06-08 2022-10-21 陕西科技大学 Correction method for printing and scanning resistant digital watermark image

Similar Documents

Publication Publication Date Title
Lin et al. An efficient watermarking method based on significant difference of wavelet coefficient quantization
Xiang et al. Histogram-based image hashing scheme robust against geometric deformations
Jabade et al. Literature review of wavelet based digital image watermarking techniques
Hamid et al. Image steganography techniques: an overview
Lin et al. A blind watermarking method using maximum wavelet coefficient quantization
CN106023056B (en) Zero watermarking insertion, extracting method and the device compressed based on DWT and principal component analysis
CN101482965B (en) Digital watermark imbedding and detecting method and device
CN101645162A (en) Printing-scanning resistance zero-watermarking algorithm
Liu et al. Grayscale image digital watermarking technology based on wavelet analysis
Chen et al. A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
Temi et al. A robust image watermarking using multiresolution analysis of wavelet
CN102184520B (en) Complete blind detection robust quantization watermarking method
Maheshwari An analysis of wavelet based dual digital image watermarking using SVD
CN101833745A (en) Method for detecting embedding and extracting of multiple binary embedded watermarks of digital image
Bi et al. A blind robust watermarking scheme based on CT and SVD
Lande et al. Robust image adaptive watermarking using fuzzy logic an FPGA approach
Rahmani et al. A new robust watermarking scheme to increase image security
CN102129659A (en) Robust zero-watermarking algorithm based on singular value decomposition, Harr wavelet transformation and mean value calculation
Kekre et al. Robust Watermaking Technique Using Hybrid Wavelet Transform Generated From Kekre Transforms and Discrete Cosine Transform
Saneie et al. Introducing a new method of robust digital image watermarking against cropping and salt & pepper noise using Sudoku
Shen et al. A robust associative watermarking technique based on similarity diagrams
Lin et al. An Electronic Bill Encryption Algorithm Based on Multiple Watermark Encryption.
Channapragada et al. Study of contemporary digital watermarking techniques
Wu et al. A DCT-based robust image watermarking using local moment
Santosh et al. Robust video watermarking algorithm using discrete wavelet transform

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100210