English  |  正體中文  |  简体中文  |  Items with full text/Total items : 54367/62174 (87%)
Visitors : 14651035      Online Users : 56
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTHU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    National Tsing Hua University Institutional Repository > 電機資訊學院 > 資訊工程學系 > 會議論文  >  Image authentication by watermarking with error correction based on wavelet transform

    Please use this identifier to cite or link to this item: http://nthur.lib.nthu.edu.tw/dspace/handle/987654321/13940

    Title: Image authentication by watermarking with error correction based on wavelet transform
    Authors: Cheng-Ta Yang
    Long-Wen Chang
    Date: 2001
    Publisher: Institute of Electrical and Electronics Engineers Inc
    Keywords: Watermarking
    Wavelet Packet Transform
    data encryption Standard
    Abstract: Recently, the digital watermark technique has been proposed to solve the problem about how to authenticate the digital data. Most current researches concern about the robusiness of the techniques. However, the multiple owner deadlock problem remains research issues. This paper uses wavelet packet to calculate the position of the significant wavelet coefficients more precisely and therefore watermark the images much better. We find the significant coefficients in each subband to embed a meaningful watermark. The watermark is permuted randomly for encryption. The random permutation can be viewed as a kind of encryption algorithm like DES(data encryption Standard) or AES(Advanced Encryption standard). The secret key can depend on the hash value of the original image. Also, we use error correction coding to protect the watermark. Visual inspection and statistical detection of the meaningful watermark problem. Based on the experimental results, the proposed scheme is robust against various attacks such as cropping, noise corruption, DCT-based and wavelet-based compression.
    Relation Link: Multimedia and Expo, 2001. ICME 2001. IEEE International Conference on
    URI: http://nthur.lib.nthu.edu.tw/handle/987654321/13940
    Appears in Collections:[資訊工程學系] 會議論文
    [資訊系統與應用研究所] 會議論文
    [電腦與通訊科技研發中心] 會議論文

    Files in This Item:

    File Description SizeFormat
    2030206030019.pdf468KbAdobe PDF499View/Open


    SFX Query


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback