2014
Chrysochos, Eleftherios; Fotopoulos, Vasileios; Xenos, Michalis; Skodras, Athanassios
Hybrid watermarking based on chaos and histogram modification Journal Article
In: Signal, Image and Video Processing, vol. 8, no. 5, pp. 843–857, 2014.
Abstract | Links | BibTeX | Tags: Authentication, Chaos, Chaotic maps, DCTRobust watermarking, Dual watermarking, Geometrical attacks, Histogram modification
@article{Chrysochos2014b,
title = {Hybrid watermarking based on chaos and histogram modification},
author = {Eleftherios Chrysochos and Vasileios Fotopoulos and Michalis Xenos and Athanassios Skodras},
url = {https://link.springer.com/article/10.1007/s11760-012-0307-3},
doi = {10.1007/s11760-012-0307-3},
year = {2014},
date = {2014-01-01},
journal = {Signal, Image and Video Processing},
volume = {8},
number = {5},
pages = {843--857},
publisher = {Springer},
abstract = {A hybrid watermarking scheme for authentication is presented, which demonstrates robustness against various attacks. Due to the different nature of filtering and geometrical attacks, two different watermarks are used in this scheme. The first one is embedded in frequency domain combined with a chaotic function and is based on the correlation method. The second watermark is embedded in luminosity histogram of the image. In this way, this hybrid watermarking scheme combines the robustness of chaotic domain against filtering, noise and compression attacks with the robustness of histogram domain against geometrical attacks.},
keywords = {Authentication, Chaos, Chaotic maps, DCTRobust watermarking, Dual watermarking, Geometrical attacks, Histogram modification},
pubstate = {published},
tppubtype = {article}
}
A hybrid watermarking scheme for authentication is presented, which demonstrates robustness against various attacks. Due to the different nature of filtering and geometrical attacks, two different watermarks are used in this scheme. The first one is embedded in frequency domain combined with a chaotic function and is based on the correlation method. The second watermark is embedded in luminosity histogram of the image. In this way, this hybrid watermarking scheme combines the robustness of chaotic domain against filtering, noise and compression attacks with the robustness of histogram domain against geometrical attacks.