Watermarking scheme of colour image based on chaotic sequences

Nian-sheng Liu, Dong-hui Guo

Optoelectronics Letters ›› 2009, Vol. 5 ›› Issue (3) : 227-231.

Optoelectronics Letters ›› 2009, Vol. 5 ›› Issue (3) : 227-231. DOI: 10.1007/s11801-009-9044-4
Article

Watermarking scheme of colour image based on chaotic sequences

Author information +
History +

Abstract

The proposed perceptual mask is based on the singularity of cover image and matches very well with the properties of the human visual system. The cover colour image is decomposed into several subbands by the wavelet transform. The watermark composed of chaotic sequence and the covert image is embedded into the subband with the largest energy. The chaos system plays an important role in the security invisibility and robustness of the proposed scheme. The parameter and initial state of chaos system can directly influence the generation of watermark information as a key. Moreover, the watermark information has the property of spread spectrum signal by chaotic sequence to improve the invisibility and security of watermarked image. Experimental results and comparisons with other watermarking techniques prove that the proposed algorithm is effective and feasible, and improves the security, invisibility and robustness of watermarking information.

Keywords

Host Image / JPEG Compression / Chaotic Sequence / Watermark Technique / Watermark Signal

Cite this article

Download citation ▾
Nian-sheng Liu, Dong-hui Guo. Watermarking scheme of colour image based on chaotic sequences. Optoelectronics Letters, 2009, 5(3): 227‒231 https://doi.org/10.1007/s11801-009-9044-4

References

[1]
van SchyndelR. G., TirkelA. Z., OsborneC. F.. In International Conference on Image Processing, 1994, 2: 86
[2]
ChenK., WangJ.. Journal of Computer-Aided Design & Computer Graphics, 2007, 19: 811
[3]
PingD., Brankov JovanG., Galatsanos NikolasP.. IEEE Transactions on Image Processing, 2005, 12: 2140
CrossRef Google scholar
[4]
ZhangY., WenX.-b., WangC.-dong.. Journal of Optoelectronics · Laser, 2008, 19: 1097
[5]
TakaakiF., MakiY., ToruF.. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007, E90-A: 216
CrossRef Google scholar
[6]
RyuichiH., TohruK.. International Journal of Bifurcation and Chaos, 2007, 17: 3618
[7]
LiuN., GuoD.. Computer Engineering, 2006, 32: 135
[8]
W. Stallings, Cryptography and Network Security: Principles and Practice. 2nd ed, Prentice-Hall, Inc. (2003), 24.

Accesses

Citations

Detail

Sections
Recommended

/