TY - JOUR
T1 - Blind image watermarking method based on linear canonical wavelet transform and QR decomposition
AU - Guo, Yong
AU - Li, Bing Zhao
N1 - Publisher Copyright:
© The Institution of Engineering and Technology 2016.
PY - 2016/10/1
Y1 - 2016/10/1
N2 - Inspired by the fact that wavelet transform can be written as a classical convolution form, a new linear canonical wavelet transform (LCWT) based on generalised convolution theorem associated with linear canonical transform (LCT) is proposed recently. The LCWT not only inherits the advantages of multi-resolution analysis of wavelet transform (WT), but also has the capability of image representations in the LCT domain. Based on these good properties, the authors propose a novel image watermarking method using LCWT and QR decomposition. Compared with the existing image watermarking methods based on discrete WT or QR, this novel image watermarking method provides more flexibility in the image watermarking. Peak signal-to-noise ratio, normalised cross and structural similarity index measure are used to verify the advantages of the proposed method in simulation experiments. The experiment results show that the proposed method is not only feasible, but also robust to some geometry attacks and image processing attacks.
AB - Inspired by the fact that wavelet transform can be written as a classical convolution form, a new linear canonical wavelet transform (LCWT) based on generalised convolution theorem associated with linear canonical transform (LCT) is proposed recently. The LCWT not only inherits the advantages of multi-resolution analysis of wavelet transform (WT), but also has the capability of image representations in the LCT domain. Based on these good properties, the authors propose a novel image watermarking method using LCWT and QR decomposition. Compared with the existing image watermarking methods based on discrete WT or QR, this novel image watermarking method provides more flexibility in the image watermarking. Peak signal-to-noise ratio, normalised cross and structural similarity index measure are used to verify the advantages of the proposed method in simulation experiments. The experiment results show that the proposed method is not only feasible, but also robust to some geometry attacks and image processing attacks.
UR - http://www.scopus.com/inward/record.url?scp=84990020958&partnerID=8YFLogxK
U2 - 10.1049/iet-ipr.2015.0818
DO - 10.1049/iet-ipr.2015.0818
M3 - Article
AN - SCOPUS:84990020958
SN - 1751-9659
VL - 10
SP - 773
EP - 786
JO - IET Image Processing
JF - IET Image Processing
IS - 10
ER -