Share Email Print

Proceedings Paper

A blind watermarking using data matrix and changing coefficients in wavelet domain
Author(s): Jong Sam Park; Boo Hee Nam
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In this paper, we propose a blind watermarking using the Discrete Wavelet Transform (DWT) technique. We have shown a robustness in several attacks by inserting the watermark in the frequency domain instead of spatial domain in the image. Also, we can extract watermark without the original image using this blind watermarking. An original image is transformed into the 4 sub-band areas (HH, HL, LH, LL) by the DWT. We select the two sub-band areas (HL, LH) for watermarking, except for the low-low (LL, HH) sub-band area. For watermarking, a watermark is encrypted by an encryption key, and it holds a certain value of two sub-bands, which is selected according to the value of watermark that we want to insert or change. And we insert watermark to the image. For extraction, a watermarked image is transformed by DWT, we compare the coefficient values of two sub-bands used in inserting watermarking, we extract the encrypted watermark, and we reconstruct the watermark by the encryption key. We apply the proposed method to the data matrix that is a two-dimension bar-code. For error detection code and error correction code, we use the ECC 200. For the JPEG image with the watermark, we could get the better PSNR(Peak Signal to Noise Ratio) and NC(Normalized Correlation) for the performance evaluation.

Paper Details

Date Published: 9 January 2008
PDF: 6 pages
Proc. SPIE 6794, ICMIT 2007: Mechatronics, MEMS, and Smart Materials, 679444 (9 January 2008); doi: 10.1117/12.784035
Show Author Affiliations
Jong Sam Park, Kangwon National Univ. (South Korea)
Boo Hee Nam, Kangwon National Univ. (South Korea)

Published in SPIE Proceedings Vol. 6794:
ICMIT 2007: Mechatronics, MEMS, and Smart Materials
Minoru Sasaki; Gisang Choi Sang; Zushu Li; Ryojun Ikeura; Hyungki Kim; Fangzheng Xue, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?