Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

A Blind Watermark Algorithm for Color Image Based on Dual Scrambling Technique

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Shi Hongqin ; Sch. of Software, East China Jiaotong Univ., Nanchang, China ; Lv Fangliang

In this paper, a novel watermark algorithm is proposed for still color image based on double scrambling technique and the wavelet transform. The major application for watermark is protecting intellectual property rights (IPR). Our robust watermark is used for copyright protection owners. The main reason for protecting copyrights is to prevent image piracy when the provider distributes the image on the Internet. In the algorithm, the original color image is transformed from RGB to the YUV color space and scrambled by Fibonacci transformation. Then use the integer transform to get the KY, KU and KV values. Using human visual system (HVS) characteristics, the luminance of KY is decomposed into HH, HL, LH and LL sub-bands by discrete integer wavelet transform (DIWT). A meaning binary image scrambled by Arnold transformation as watermark is embedded into the Low-frequency of the KY value. Both theoretical analysis and experimental results show that the proposed technique is robust to JPEG compression attacks and have little impression to the original photograph.

Published in:

Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on

Date of Conference:

2-4 April 2010