2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN) 2014
DOI: 10.1109/wocn.2014.6923098
|View full text |Cite
|
Sign up to set email alerts
|

A digital watermarking approach based on DCT domain combining QR code and chaotic theory

Abstract: Abstract-This paper proposes a robust watermarking approach based on Discrete Cosine Transform (DCT) domain that combines Quick Response (QR) Code and chaotic system. When embed the watermark, the high error correction performance and the strong decoding capability of QR Code are utilized to decode the text watermark information which improves the robustness of the watermarking algorithm. Then the QR Code image is encrypted with chaotic system to enhance the security of this approach. Finally the encrypted ima… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…Ref [16] is a secret hiding scheme by improving exploiting modification direction to protect the private message in QR code with the computational complexity as O(N ). The time complexity of [2] where an optical encryption is used decided by parameter λ. Ref [17], [18] both use digital watermarking technology to realize the embedding of secret information. Because the schemes employ discrete cosine transform to perform operations in the frequency domain, its computational complexity is relatively high.…”
Section: A: Methods and Computational Complexity Of Extractionmentioning
confidence: 99%
“…Ref [16] is a secret hiding scheme by improving exploiting modification direction to protect the private message in QR code with the computational complexity as O(N ). The time complexity of [2] where an optical encryption is used decided by parameter λ. Ref [17], [18] both use digital watermarking technology to realize the embedding of secret information. Because the schemes employ discrete cosine transform to perform operations in the frequency domain, its computational complexity is relatively high.…”
Section: A: Methods and Computational Complexity Of Extractionmentioning
confidence: 99%
“…Based on the watermarking scheme, Ref. [21,22] used digital watermarking technology Begin Construct a carrier pixel block and fill the s C k (i, j) ∉ functional patterns, choose the column of matrix and let X (i, j) = (a 1 (i,j) , a 2 (i,j) , ..., a…”
Section: Methods and Recovery Computation Based On The Visual Cryptogmentioning
confidence: 99%
“…Based on the error correction mechanism of QR code, Ref. [8,16,[19][20][21][22] employed part of error correction codewords to embed the secret bits with the condition of ensuring the readability of QR code. While, this paper and Ref.…”
Section: Utilizing the Error Correctionmentioning
confidence: 99%
“…The QR code is an error correction code and has high information capacity. Therefore, it is commonly used as watermark generation method [58][59][60]. Hence, we propose a novel QR code-based watermark generation method.…”
Section: Odd-even Quantization-based Embedding Of Watermark Bmentioning
confidence: 99%