Fan Tiesheng, Qu Da-peng, Dou Chunyi, Wang Tao, W. Jun
{"title":"An Algorithm of Mean Quantification Digital Watermarking based on Lifting Wavelet Coefficients","authors":"Fan Tiesheng, Qu Da-peng, Dou Chunyi, Wang Tao, W. Jun","doi":"10.1109/KAMW.2008.4810506","DOIUrl":null,"url":null,"abstract":"Because traditional wavelet transformation is decimals, which inevitably introduce transformation error in image watermarking. A digital watermarking algorithm is presented based on the mean quantification of the second generation wavelet. After a host image is decomposed by the lifting wavelet, its low frequency coefficients is used as performing the mean and quantification processes, and embedding and extracting the blind watermark within it. Experimental results show that the algorithm has a fine transparence of embedding watermarking and has strongly robust to usual image process multi-attacks.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KAMW.2008.4810506","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Because traditional wavelet transformation is decimals, which inevitably introduce transformation error in image watermarking. A digital watermarking algorithm is presented based on the mean quantification of the second generation wavelet. After a host image is decomposed by the lifting wavelet, its low frequency coefficients is used as performing the mean and quantification processes, and embedding and extracting the blind watermark within it. Experimental results show that the algorithm has a fine transparence of embedding watermarking and has strongly robust to usual image process multi-attacks.