Cryptography Reference
In-Depth Information
(a)
(b)
(c)
Fig. 11.5. Original image and watermarks. (a) Original Lena image. (b) Original
robust watermark. (c) Original semi-fragile watermark.
(a)
(b)
Fig. 11.6. The watermarked images obtained by algorithms having different em-
bedding orders. (a) The watermarked image with PSNR = 30.553 dB obtained by
using the proposed method. (b) The watermarked image with PSNR = 26.105 dB
obtained by using the algorithm in the reverse embedding order.
image quality than the alternative. The first reason for this is that the first-
stage codebook is small. The second reason is that the robust embedding
algorithm [20] does not modify the encoded indices at all. In contrast the
semi-fragile watermarking method does. If we embed the semi-fragile water-
mark in the first stage, then the reconstructed error image may be very poor,
which greatly affects the reconstructed image.
In this chapter, we use the Normalized Hamming Similarity , NHS, to eval-
uate the effectiveness of the proposed algorithm. The NHS between the em-
bedded binary watermark W and that extracted W is defined as
NHS = 1− HD (W, W
)
,
(11.13)
A w
B w
where HD(,) denotes the Hamming Distance between two binary strings.
That is, the number of different bits in the two binary strings. We can easily
Search WWH ::




Custom Search