Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms

  • Authors:
  • Jinwei Wang;Guangjie Liu;Yuewei Dai;Zhiquan Wang;Shiguo Lian

  • Affiliations:
  • Nanjing University of Science and Technology, P.R. China;Nanjing University of Science and Technology, P.R. China;Nanjing University of Science and Technology, P.R. China;Nanjing University of Science and Technology, P.R. China;France Telecom R&D Beijing, P.R. China

  • Venue:
  • ICICIC '06 Proceedings of the First International Conference on Innovative Computing, Information and Control - Volume 3
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, two novel transforms are defined, which are respectively called DWT-IDCT transform and DCT-IDWT transform, and then two novel watermarking schemes based on these two transforms are proposed. The proposed schemes are compared with the existing scheme based on DWT transform. Furthermore, since the defined transforms can be roundly used, the schemes themselves are compared in order to evaluate the effect of the round time to the schemes. As is shown by the comparison and analysis, the scheme based on DCT-IDWT is the most robust against the various attacks than the others, and moreover, the round time is chosen once or twice as recommendation for the consideration of robustness and computation time.