首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Embedding color watermarks in color images based on Schur decomposition
Authors:Qingtang Su  Yugang Niu  Xianxi Liu  Yu Zhu
Institution:1. Key Laboratory of Advanced Control and Optimization for Chemical Process (East China University of Science and Technology), Ministry of Education, Shanghai, China;2. School of Information Science and Engineering, Lu Dong University, Yantai, China;3. Mechanical & Electrical Engineering College Shandong Agricultural University, Tai''an, China;1. Department of Electronics, Faculty of Sciences and Technology, Electrical Engineering Laboratory, University of Kasdi Merbah, 30000 Ouargla, Algeria;2. Computer Science Department, Faculty of Sciences and Technology, Artificial Intelligence and Information Technology Laboratory (LINATI), University of Kasdi Merbah, 30000 Ouargla, Algeria;1. School of Information Science and Engineering, Lu Dong University, Yantai 264025, PR China;2. Key Laboratory of Advanced Control and Optimization for Chemical Process, Ministry of Education, East China University of Science and Technology, Shanghai 200237, PR China;1. Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India;2. Department of Computer Science and Engineering, National Institute of Technology Patna, Bihar, India
Abstract:In this paper, a blind dual color image watermarking scheme based on Schur decomposition is introduced. This is the first time to use Schur decomposition to embed color image watermark in color host image, which is different from using the binary image as watermark. By analyzing the 4 × 4 unitary matrix U via Schur decomposition, we can find that there is a strong correlation between the second row first column element and the third row first column element. This property can be explored for embedding watermark and extracting watermark in the blind manner. Since Schur decomposition is an intermediate step in SVD decomposition, the proposed method requires less number of computations. Experimental results show that the proposed scheme is robust against most common attacks including JPEG lossy compression, JPEG 2000 compression, low-pass filtering, cropping, noise addition, blurring, rotation, scaling and sharpening et al. Moreover, the proposed algorithm outperforms the closely related SVD-based algorithm and the spatial-domain algorithm.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号