Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (4): 28-30    DOI:
Current Issue | Archive | Adv Search |
An Algorithm Based on Visual Properties and DWT
Li Hao,Liang Jiadong
Qingdao University of Science and Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Digital image has become an important medium for people to store information, disseminate knowledge and analyze problems, especially in the information age. However, with the development of network technology and the lack of corresponding supervision technology, the digital images which are transmitted in the network are very easy to be stolen and tampered. The owners of the image are hard to maintain their ownership without technical support. The increasing development of digital watermarking technology is to solve this problem. In this paper, a watermarking algorithm based on human visual properties and robustness in wavelet domain is proposed.
Key wordsdigital watermark      DWT      encryption     
Published: 10 November 2017
ZTFLH:  TP391  

Cite this article:

Li Hao, Liang Jiadong. An Algorithm Based on Visual Properties and DWT. Computer & Telecommunication, 2016, 1(4): 28-30.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I4/28

[1] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[2] ZHANG Yu. Application of DES File Encryption in Network Security[J]. 电脑与电信, 2019, 1(7): 49-.
[3] LI Peng, ZHAI Ran, ZONG Rong, DING Hong-wei , GUO Jia. Research and Application of the Chaotic Masking Communication in IPTV System[J]. 电脑与电信, 2018, 1(1-2): 5-9.
[4] XU Yan, NIU Xiu-ling, SHI Fan. Image Encryption Algorithm Based on theWavelet and FRFT[J]. 电脑与电信, 2018, 1(1-2): 44-46.
[5] ZHAO Yin. Image Encryption of Two-direction Folded Diffusion Chaotic System Based on Shuffle Algorithm[J]. 电脑与电信, 2018, 1(12): 50-55.
[6] Li Fangjun. The Application of Data Encryption Technology in Computer Network Communication Security[J]. 电脑与电信, 2017, 1(5): 59-61.
[7] Yang Shuguo, Zhang Bo, Wang Yuxin, Li Tianying, Xue Mingyu. An Image Fractal Zero-watermark Algorithm in DWT Domain[J]. 电脑与电信, 2017, 1(4): 7-10.
[8] Ge Lan. The Principle and Implementation of Vigenere Encryption Algorithm[J]. 电脑与电信, 2017, 1(4): 64-65.
[9] Liu Qingliang, Yang Shuguo. Image Dual Watermarking Algorithm Based onWavelet Transform[J]. 电脑与电信, 2017, 1(10): 1-5.
[10] Li Ruiqiang. Research on Cloud Computing Data Security Protection[J]. 电脑与电信, 2017, 1(10): 89-91.
[11] Wang Xiaohong. Application of Enterprise Virtual Private Network Technology Based on ADSL[J]. 电脑与电信, 2016, 1(9): 41-42.
[12] Bai Yu. Analysis on Network Security and Information Encryption Technology[J]. 电脑与电信, 2016, 1(8): 53-54.
[13] Deng Hui. Research on Image Encryption Algorithm Based on Chaos Theory[J]. 电脑与电信, 2016, 1(7): 9-11.
[14] Yao Bingying, Li Chuanqing, Li Chao. Design of the Cloud Storage Authentication System Based on Fingerprint Identification[J]. 电脑与电信, 2016, 1(7): 15-17.
[15] Yang Shuguo, Li Hao. A DigitalWatermarking Algorithm Base on Chaos and IWT[J]. 电脑与电信, 2016, 1(1-2): 18-21.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd