Fig 8 - uploaded by Kehui Sun
Content may be subject to copyright.
1 Invisibility and extractability test: (a) Original "Lena" image; (b) Watermark logo; (c) Watermarked image; (d) Extracted watermark with right secret keys. (e) Extracted watermark with wrong key z0

1 Invisibility and extractability test: (a) Original "Lena" image; (b) Watermark logo; (c) Watermarked image; (d) Extracted watermark with right secret keys. (e) Extracted watermark with wrong key z0

Source publication
Chapter
Full-text available
To protect copyrights of multi-media products effectively, we focus on the topic of chaos applications in digital watermarking. Digital watermarking algorithms in digital images or video based on chaos and other techniques were proposed. The experiments results show that the proposed algorithms keep the quality of the image or video well and are ro...

Similar publications

Article
Full-text available
The chances of copyright violation and privacy have been increased due to growth of networking and technology. Digital watermark is useful to verify the integrity of the content and for authenticity of an owner. A digital watermark is a digital signal or pattern inserted into a digital document (text, graphics and multimedia presentations). Waterma...
Article
We consider how an untrusted data aggregator can be assessed over multiple data streams. The aggregator could be the sink node in a sensor network where all the sensory data are gathered, or a smart-meter responsible for computing power measurements of a group of households, or any other entity that is basically in charge of answering aggregation q...
Article
Full-text available
The researcher has adopted a digital watermarking technique which operates in the frequency domain: a hybrid watermarking scheme based joint discrete wavelet transform - discrete cosine transform - (DWT-DCT). Its main objective is to test whether this technique can withstand attacks (its robustness) and invisibility (its imperceptibility), achieved...

Citations

Article
Full-text available
A robust digital image watermarking system with a fractional-order discrete-time chaotic system and discrete wavelet transform-singular value decomposition is presented. The inclusion method inserts an encrypted image into the dynamics of an integer-order discrete-time chaotic system and the resulting cipher serves as a host image watermark. A watermarking function (DWT-SVD transform) watermarks a host image before the watermark is extracted and decrypted at the receiver. As a contribution, our suggested approach introduces a new watermarking system based on discrete-time chaotic systems, as well as a hybridization of integer and fractional-order systems to ensure the watermarking scheme’s robustness. Our method achieved good results in terms of robustness, with normalized cross correlation values above 0.99 when subjected to a range of attacks. Results of the simulation underline practicality and robustness achieved by this approach. They also indicate that the proposed system resists various attacks.