A blind image copyright protection scheme for e-government

  • Authors:
  • Shi-Jinn Horng;Didi Rosiyadi;Tianrui Li;Terano Takao;Minyi Guo;Muhammad Khurram Khan

  • Affiliations:
  • School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China and Department of Computer Science and Information Engineering, National Taiwan University of Sci ...;Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taiwan, ROC and Research Center for Informatics, Indonesian Institute of Sciences ...;School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China;Department of Computational Intelligence and Systems Science, Tokyo Institute of Technology, Tokyo, Japan;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China;Center of Excellence in Information Assurance, King Saud University, Saudi Arabia

  • Venue:
  • Journal of Visual Communication and Image Representation
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

An efficient blind copyright protection for e-government document images is proposed through a combination of the discrete cosine transform (DCT) and the singular value decomposition (SVD) based on genetic algorithm (GA). This combination could lead the watermarked image to be resistant to various attacks as well as to improve its performance, security and robustness. DCT, in this case, is applied to the entire image and mapped by a zigzag manner to four areas from the lowest to the highest frequencies. SVD, meanwhile, is applied in each area and then the singular value of DCT-transformed host image, subsequently, is modified in each area with the quantizing value using GA to increase the visual quality and the robustness. The host image is not needed in the watermark extraction and it is more useful than non-blind one in real-world applications. Experiment results demonstrate that the proposed method outperforms other existing methods under several types of attacks.