4.7 Article

Blind watermarking scheme for medical and non-medical images copyright protection using the QZ algorithm

期刊

EXPERT SYSTEMS WITH APPLICATIONS
卷 241, 期 -, 页码 -

出版社

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.eswa.2023.122547

关键词

Forgery Attacks; False -Positive Problem; QZ Algorithm; Discrete Wavelet Transform-Singular Value; Decomposition (DWT-SVD)

向作者/读者索取更多资源

This paper presents a novel blind watermarking scheme based on the QZ algorithm, which solves the non-blind problem in existing watermarking schemes by using the watermark and host image as inputs for the QZ algorithm. The experimental results show that our scheme is robust against various attacks and forgeries, and out-performs the existing addition-based schemes in terms of invisibility.
The widely used watermarking technique is to hide the watermark information through adding process, which means the watermark is added with the host image to realize embedding. The constraints of these addition-based watermarking systems mainly are non-blind, they are vulnerable to forgery attacks and have the false-positive problem. To solve these problems, a novel blind watermarking scheme based on the QZ algorithm for medical and normal images is first presented in this paper. In the presented scheme, we take the watermark and the host image as two inputs of the QZ algorithm to realize embedding, rather than the adding process. The outputs of the QZ algorithm include four parts: two upper quasitriangular matrices and two unitary matrices. Then the three parts of the outputs are synthesized by the vector synthesis and inverse discrete wavelet transform-singular value decomposition (DWT-SVD) to obtain the watermarked host image. Due to the characteristics of the QZ algorithm, our scheme is blind. The performance is tested and compared by applying our scheme to both medical and non -medical images. The experimental results show that our scheme is robust against various image-processing at-tacks, forgery attacks, and false-positive problem. And from the comparison results, the proposed scheme out-performs the existing addition-based schemes in terms of robustness against the Median filter, Low-pass filter, Gaussian blur attacks, and forgery attacks, while maintaining good invisibility.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据