{"title":"基于非负矩阵分解和小波变换的图像水印改进方案","authors":"Long Ma, S. Song","doi":"10.1109/WCSP.2009.5371664","DOIUrl":null,"url":null,"abstract":"Ouhsain et al [Expert Systems with Applications 36, 2123–2129(2009)] presented a technique using DWT and NMF, which apply NMF to the blocks of the wavelet decomposition sub-band, and then is followed by eigendecomposition distortion. Motivated by the approach of Ouhsain et al, we proposed an improved image watermarking scheme. Our technique do not apply NMF to the blocks of the wavelet decomposition sub-band, direct apply SVD to these blocks. Our proposed algorithm is simpler than algorithm of Ouhsain et al. Experimental results demonstrate that the proposed scheme not only provides good fidelity and robustness against intentional attacks and normal visual processes, but also achieves a low computational complexity.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"130 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Improved image watermarking scheme using nonnegative matrix factorization and wavelet transform\",\"authors\":\"Long Ma, S. Song\",\"doi\":\"10.1109/WCSP.2009.5371664\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ouhsain et al [Expert Systems with Applications 36, 2123–2129(2009)] presented a technique using DWT and NMF, which apply NMF to the blocks of the wavelet decomposition sub-band, and then is followed by eigendecomposition distortion. Motivated by the approach of Ouhsain et al, we proposed an improved image watermarking scheme. Our technique do not apply NMF to the blocks of the wavelet decomposition sub-band, direct apply SVD to these blocks. Our proposed algorithm is simpler than algorithm of Ouhsain et al. Experimental results demonstrate that the proposed scheme not only provides good fidelity and robustness against intentional attacks and normal visual processes, but also achieves a low computational complexity.\",\"PeriodicalId\":244652,\"journal\":{\"name\":\"2009 International Conference on Wireless Communications & Signal Processing\",\"volume\":\"130 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Wireless Communications & Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCSP.2009.5371664\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Wireless Communications & Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSP.2009.5371664","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improved image watermarking scheme using nonnegative matrix factorization and wavelet transform
Ouhsain et al [Expert Systems with Applications 36, 2123–2129(2009)] presented a technique using DWT and NMF, which apply NMF to the blocks of the wavelet decomposition sub-band, and then is followed by eigendecomposition distortion. Motivated by the approach of Ouhsain et al, we proposed an improved image watermarking scheme. Our technique do not apply NMF to the blocks of the wavelet decomposition sub-band, direct apply SVD to these blocks. Our proposed algorithm is simpler than algorithm of Ouhsain et al. Experimental results demonstrate that the proposed scheme not only provides good fidelity and robustness against intentional attacks and normal visual processes, but also achieves a low computational complexity.