Reference Hub1
Strong Robustness Watermarking Algorithm Based on Lifting Wavelet Transform and Hessenberg Decomposition

Strong Robustness Watermarking Algorithm Based on Lifting Wavelet Transform and Hessenberg Decomposition

Fan Li, Lin Gao, Junfeng Wang, Ruixia Yan
Copyright: © 2022 |Volume: 19 |Issue: 1 |Pages: 19
ISSN: 1545-7362|EISSN: 1546-5004|EISBN13: 9781799893462|DOI: 10.4018/IJWSR.314948
Cite Article Cite Article

MLA

Li, Fan, et al. "Strong Robustness Watermarking Algorithm Based on Lifting Wavelet Transform and Hessenberg Decomposition." IJWSR vol.19, no.1 2022: pp.1-19. http://doi.org/10.4018/IJWSR.314948

APA

Li, F., Gao, L., Wang, J., & Yan, R. (2022). Strong Robustness Watermarking Algorithm Based on Lifting Wavelet Transform and Hessenberg Decomposition. International Journal of Web Services Research (IJWSR), 19(1), 1-19. http://doi.org/10.4018/IJWSR.314948

Chicago

Li, Fan, et al. "Strong Robustness Watermarking Algorithm Based on Lifting Wavelet Transform and Hessenberg Decomposition," International Journal of Web Services Research (IJWSR) 19, no.1: 1-19. http://doi.org/10.4018/IJWSR.314948

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Watermark imperceptibility and robustness in the present watermarking algorithm based on discrete wavelet transform (DWT) could be weakened due to data truncation. To solve this problem, a strong robustness watermarking algorithm based on the lifting wavelet transform is proposed. First, the color channels of the original image are separated, and the selected channels are processed through lifting wavelet transform to obtain low-frequency information. The information is then split into blocks, with Hesseneberg decomposition performed on each block. Arnold algorithm is used to scramble the watermark image, and the scrambled watermark is transformed into a binary sequence that is then embedded into the maximum element of Hessenberg decomposed matrix by quantization modulation. The experimental results exhibit a good robustness of this new algorithm in defending against a wide variety of conventional attacks.