• Optics and Precision Engineering
  • Vol. 25, Issue 11, 2968 (2017)
WU Jia-nan1,2,*, WANG Shi-gang1, ZHANG Di2, LIU Gui-xia3, and ZHOU You3
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: 10.3788/ope.20172511.2968 Cite this Article
    WU Jia-nan, WANG Shi-gang, ZHANG Di, LIU Gui-xia, ZHOU You. Binary image watermark fusionbased on quantum key true randomness[J]. Optics and Precision Engineering, 2017, 25(11): 2968 Copy Citation Text show less
    References

    [1] WOLFGANG R B, PODILCHUK C I, DELP E J. Perceptual watermarks for digital images and video[J]. Proceedings of the IEEE, 1999, 87(7): 1108-1126.

    [2] VAN SCHYNDEL R G, TIRKEL A Z, OSBORNE C F. A digital watermark[C]. Proceedings of the 1st International Conference on Image Processing, IEEE, 1994(2): 86-90.

    [3] COX I J, KILIAN J, LEIGHTON T, et al.. Secure spread spectrum watermarking for images, audio and video[C]. Proceedings of the 3rd IEEE International Conference on Image Processing, IEEE, 1996: 243-246.

    [4] COX I J, KILIAN J, LEIGHTON F T, et al.. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673-1687.

    [5] RUANAIDH J J K O, DOWLING W J, BOLAND F M. Phase watermarking of digital images[C]. Proceedings of the 3rd IEEE International Conference on Image Processing, IEEE, 1999, 3: 239-242.

    [6] KUNDUR D, HATZINAKOS D. A robust digital image watermarking method using wavelet-based fusion[C]. Proceedings of International Conference on Image Processing, IEEE, 1997: 544-547.

    [7] ZHAO B, QIN G H. High robustness image watermarking algorithm[J]. Journal of Jilin University (Engineering and Technology Edition), 2017, 47(1): 249-254. (in Chinese)

    [8] ZHENG Q M, JIN X, GU G M, et al.. A digital watermarking algorithm based on Data Matrix[J]. Journal of China University of Petroleum, 2015, 39(1): 188-193. (in Chinese)

    [9] WANG P, YAO H, LI L. A adaptive digital watermarking algorithm combining spatial and DWT domain[J]. Opt. Precision Eng., 2006, 14(6): 1057-1062. (in Chinese)

    [10] LOUKHAOUKHA K, NABTI M, ZEBBICHE K. A robust SVD-based image watermarking using a multi-objective particle swarm optimization[J]. Opto-Electronics Review, 2014, 22(1): 45-54.

    [11] QI X J, XIN X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization[J]. Journal of Visual Communication and Image Representation, 2015, 30: 312-327.

    [12] SUTHAHARAN S. Fragile image watermarking using a gradient image for improved localization and security[J]. Pattern Recognition Letters, 2004, 25(16): 1893-1903.

    [13] HE H J, ZHANG J SH, TAI H M. A secure fragile watermarking scheme for image authentication[C].Proceedings of 2006 International Conference on Computational Intelligence and Security, IEEE, 2006: 1180-1185.

    [14] KUNDUR D, HATZINAKOS D. Digital watermarking for telltale tamper proofing and authentication[J]. Proceedings of the IEEE, 1999, 87(7): 1167-1180.

    [15] FRIDRICH J, GOLJAN M. Images with self-correcting capabilities[C]. Proceedings of 1999 International Conference on Image Processing, IEEE, 1999: 792-796.

    [16] LIN P L, HUANG P W, PENG A W. A fragile watermarking scheme for image authentication with localization and recovery[C]. Proceedings of the 6th International Symposium on Multimedia Software Engineering, IEEE, 2004: 146-153.

    [17] WANG D CH, TIAN C C, CHEN B J, et al.. Dual watermarking for color images based on 4D quaternion frequency domain[J]. Journal of Jilin University (Engineering and Technology Edition), 2015, 45(4): 1336-1346. (in Chinese)

    [18] BENNETT C H, BRASSARD G. Quantum cryptography: public key distribution and coin tossing[C]. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, IEEE, 1984.

    [19] WANG Y H, ZHU CH Q, SU SH B, et al.. An authentication method based on perceptual hashing and watermarking for remote sensing image[J]. Opt. Precision Eng., 2016, 24(10): 640-648. (in Chinese)

    [20] SINGH A K, DAVE M, MOHAN A. Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain[J]. National Academy Science Letters, 2014, 37(4): 351-358.

    CLP Journals

    [1] Wang Xinliang, Huang Qinggai, Zhang Zhongwei. Fragment transmission scheme of quantum cluster[J]. Infrared and Laser Engineering, 2018, 47(11): 1122004

    [2] TANG Yong-jun. Image watermarking algorithms based on pseudo-random method[J]. Chinese Journal of Liquid Crystals and Displays, 2020, 35(3): 287

    [3] WANG Yun-lan. Video watermarking algorithm based on extreme learning machine and discrete wavelet transform[J]. Chinese Journal of Liquid Crystals and Displays, 2020, 35(2): 180

    WU Jia-nan, WANG Shi-gang, ZHANG Di, LIU Gui-xia, ZHOU You. Binary image watermark fusionbased on quantum key true randomness[J]. Optics and Precision Engineering, 2017, 25(11): 2968
    Download Citation