scholarly journals Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking

Author(s):  
Benjamin Mathon ◽  
Patrick Bas ◽  
Francois Cayre
2010 ◽  
Vol 30 (10) ◽  
pp. 2843-2845 ◽  
Author(s):  
Shi-biao HE ◽  
Dong-mei LUO ◽  
Cheng GU

2011 ◽  
Vol 20 (11) ◽  
pp. 3207-3218 ◽  
Author(s):  
Fan Zhang ◽  
Wenyu Liu ◽  
Weisi Lin ◽  
King Ngi Ngan

Author(s):  
Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra

This paper presents a new watermarking technique using hybrid image transforms that aims to be very robust against attacks. It also aims to reduce the amount of distortion created from embedding the watermark as much as possible, and have good capacity. The proposed system uses a hybrid watermarking technique that is based on Non-Subsampled Contourlet Transform and Discrete Wavelet Transform. In addition, the proposed system makes use of the fuzzy logic to automatically choose the strength of the embedded watermark. Furthermore, the system uses Spread Spectrum Code Division Multiple Access to embed and recover the watermark after transforming the image. To enhance recoverability of the watermarks, the system uses a high level of redundancy in the embedding process, which allows a powerful Error Correcting Code to be used in the recovery process. The fuzzy logic is used to help the system in producing watermarked images that reserve their quality and not be heavily altered after embedding the watermark. Experiments were performed to measure the quality of the proposed system using JPEG compression attacks. The results showed that the proposed system is robust and has good capacity and imperceptibly although it suffers from being computationally complex.


1999 ◽  
Vol 09 (01) ◽  
pp. 155-213 ◽  
Author(s):  
MAKOTO ITOH

A new scheme is proposed for spread spectrum communication which transmits both analog and binary data via chaotic carriers. The proposed systems have some standard properties of spread spectrum communication. Some computer simulations and performance analysis are given to examine the validity of this scheme.


Sign in / Sign up

Export Citation Format

Share Document