{"title":"Wavelet-Based Watermarking with New Key Sequence in Still Images","authors":"M. Nakamoto, S. Fujimoto, A. Doi, T. Hinamoto","doi":"10.1109/ISPACS.2006.364858","DOIUrl":null,"url":null,"abstract":"We treat a digital watermarking in digital still image based on discrete wavelet transform (DWT). For copyright protection, ID is embedded in DWT domain by using key sequence. For security, it is desirable to be hard to counterfeit the key and ID. In this work, we propose a watermarking method with new key sequence in the DWT domain. By using the proposed method, it is difficult to counterfeit the key and ID. Additionally, we show how to design the key sequence so that the robustness of the watermark is strong. Finally, we show the robustness against jpeg attack on the proposed watermarking method by computer simulation","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Symposium on Intelligent Signal Processing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPACS.2006.364858","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We treat a digital watermarking in digital still image based on discrete wavelet transform (DWT). For copyright protection, ID is embedded in DWT domain by using key sequence. For security, it is desirable to be hard to counterfeit the key and ID. In this work, we propose a watermarking method with new key sequence in the DWT domain. By using the proposed method, it is difficult to counterfeit the key and ID. Additionally, we show how to design the key sequence so that the robustness of the watermark is strong. Finally, we show the robustness against jpeg attack on the proposed watermarking method by computer simulation