Watermarking E-Government Document Images Using the Discrete Wavelets Transform and Schur Decomposition

Author(s):  
Hussam Barouqa ◽  
Ali Al-Haj
2012 ◽  
Vol 569 ◽  
pp. 814-817
Author(s):  
Fei Li ◽  
Ling Tang

Semi-fragile digital watermarking is able to distinguish between accidental attacks and malicious tampering, thus been closely watched in terms of multimedia content authentication. From the perspective of combining digital watermarking technology and palmprint identification, using the hidden and semi-fragile features of digital watermarking and the invariance character of palm information, the two-factor network authentication can be realized. The authentication enhances network security, and it is also a strong authentication scheme. The paper put forward a network authentication method based on palmprint and digital watermarking. The digital watermarking algorithm based on logistic encryption and discrete wavelets transform (DWT). The experimental results show that the algorithm has good semi-fragile feature, it can determine the authenticity of the palmprint image, so the method increases the reliability and efficiency of user authentication.


Author(s):  
Ali Al-Haj ◽  
Aymen Abu-Errub

The excellent spatial localization, frequency spread, and multi-resolution characteristics of the discrete wavelets transform (DWT), which are similar to the theoretical models of the human visual system, facilitated the development of many imperceptible and robust DWT-based watermarking algorithms. However, there has been extremely few proposed algorithms on optimized DWT-based image watermarking that can simultaneously provide perceptual transparency and robustness Since these two watermarking requirements are conflicting, in this paper we treat the DWT-based image watermarking problem as an optimization problem, and solve it using genetic algorithms. We demonstrate through the experimental results we obtained that optimal DWT-based image watermarking can be achieved only if watermarking has been applied at specific wavelet sub-bands and by using specific watermarkamplification values.


Sign in / Sign up

Export Citation Format

Share Document