{"title":"Adaptive image watermarking algorithm based on visual characteristics","authors":"Xuhui Cao, Qinfang Huang, Chuanmu Li","doi":"10.1109/ISCEIC53685.2021.00060","DOIUrl":null,"url":null,"abstract":"In order to make the digital watermark more robust and invisible, an image watermark embedding method based on the visual characteristics of human eyes and wavelet transform is proposed. Firstly, the binary watermark is dislocated by chaotic mapping, and then the watermark is embedded into the wavelet transform coefficients by quantization method, and the quantization step is dynamically adjusted according to the local correlation characteristics of the image and the visual characteristics of human eyes. Simulation experiments show that the algorithm not only has good transparency and security, but also has good robustness against attacks.","PeriodicalId":342968,"journal":{"name":"2021 2nd International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCEIC53685.2021.00060","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In order to make the digital watermark more robust and invisible, an image watermark embedding method based on the visual characteristics of human eyes and wavelet transform is proposed. Firstly, the binary watermark is dislocated by chaotic mapping, and then the watermark is embedded into the wavelet transform coefficients by quantization method, and the quantization step is dynamically adjusted according to the local correlation characteristics of the image and the visual characteristics of human eyes. Simulation experiments show that the algorithm not only has good transparency and security, but also has good robustness against attacks.