Watermarking scheme of colour image based on chaotic sequences

Nian-sheng Liu , Dong-hui Guo

Optoelectronics Letters ›› 2009, Vol. 5 ›› Issue (3) : 227 -231.

PDF
Optoelectronics Letters ›› 2009, Vol. 5 ›› Issue (3) : 227 -231. DOI: 10.1007/s11801-009-9044-4
Article

Watermarking scheme of colour image based on chaotic sequences

Author information +
History +
PDF

Abstract

The proposed perceptual mask is based on the singularity of cover image and matches very well with the properties of the human visual system. The cover colour image is decomposed into several subbands by the wavelet transform. The watermark composed of chaotic sequence and the covert image is embedded into the subband with the largest energy. The chaos system plays an important role in the security invisibility and robustness of the proposed scheme. The parameter and initial state of chaos system can directly influence the generation of watermark information as a key. Moreover, the watermark information has the property of spread spectrum signal by chaotic sequence to improve the invisibility and security of watermarked image. Experimental results and comparisons with other watermarking techniques prove that the proposed algorithm is effective and feasible, and improves the security, invisibility and robustness of watermarking information.

Keywords

Host Image / JPEG Compression / Chaotic Sequence / Watermark Technique / Watermark Signal

Cite this article

Download citation ▾
Nian-sheng Liu, Dong-hui Guo. Watermarking scheme of colour image based on chaotic sequences. Optoelectronics Letters, 2009, 5(3): 227-231 DOI:10.1007/s11801-009-9044-4

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

van SchyndelR. G., TirkelA. Z., OsborneC. F.. In International Conference on Image Processing, 1994, 2: 86

[2]

ChenK., WangJ.. Journal of Computer-Aided Design & Computer Graphics, 2007, 19: 811

[3]

PingD., Brankov JovanG., Galatsanos NikolasP.. IEEE Transactions on Image Processing, 2005, 12: 2140

[4]

ZhangY., WenX.-b., WangC.-dong.. Journal of Optoelectronics · Laser, 2008, 19: 1097

[5]

TakaakiF., MakiY., ToruF.. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007, E90-A: 216

[6]

RyuichiH., TohruK.. International Journal of Bifurcation and Chaos, 2007, 17: 3618

[7]

LiuN., GuoD.. Computer Engineering, 2006, 32: 135

[8]

W. Stallings, Cryptography and Network Security: Principles and Practice. 2nd ed, Prentice-Hall, Inc. (2003), 24.

AI Summary AI Mindmap
PDF

117

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/