[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1128923.1128981acmconferencesArticle/Chapter ViewAbstractPublication PagessiggraphConference Proceedingsconference-collections
Article

A novel watermarking method based on Fibonacci numbers

Published: 14 June 2006 Publication History

Abstract

A digital image scrambling method based on the Fibonacci numbers is presented in [Zou J. et al. 2004]. A novel audio watermarking method based on Fibonacci numbers is given in this paper. The experiment results show that the algorithm has better robust than the traditional phase watermark algorithm. Based on the property of uniformity of the corresponding Fibonacci transformation, the watermarking method has the following advantages: (1) Encoding and decoding are very simple and they can be applied in real-time situations. (2) The algorithm can endure severe attacks such as extreme noise levels, very high loss in its data or data packets, or m3 compression.

References

[1]
Zou J. et al. 2004. A novel digital image scrambling method based on Fibonacci sequence. Proceedings of the 2004 IEEE International Symposium on Circuits and Systems, Vancouver, Vol.3: 965--968.
[2]
Shang Y. et al. 2004. J. Fibonacci transformation and its application in digital image watermark. Journal of Sun Yat Sen University (natural science edition). Vol. 43: 148--151.
[3]
Bender W et al. 1996 Techniques for data hiding, IBM System Journal, 35(3--4): 313--335.
[4]
Aucsmith D. 1998. Information Hiding, Second International Workshop, IH'98, Portland, Oregon, USA, Proceedings LNCS, 1525.
[5]
Voyatzis G. and I. Pitas I. 1999. The use of watermarks in the protection of digital multimedia products, Proc. of the IEEE, 87(7): 1197--1207
[6]
Zou J. and Ward R. K. 2003. Introducing Two New Image Scrambling Methods, Proceeding of 2003 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 708--711.
[7]
Bergum G. E. 1991. Applications of Fibonacci Numbers, Vol. 4. Koshy T. 2001. Fibonacci and Lucas Numbers with Applications, A Wiley-Interscience Publication.

Cited By

View all
  • (2010)A multi-scale triangular mapping and its applications in variation scale scramblingInternational Journal of Computer Applications in Technology10.1504/IJCAT.2010.03414138:1/2/3(74-85)Online publication date: 1-Jul-2010
  • (2009)An Image Encryption Algorithm Based on N-Dimension Affine TransformationProceedings of the 2009 Eigth IEEE/ACIS International Conference on Computer and Information Science10.1109/ICIS.2009.31(579-585)Online publication date: 1-Jun-2009

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
VRCIA '06: Proceedings of the 2006 ACM international conference on Virtual reality continuum and its applications
June 2006
410 pages
ISBN:1595933247
DOI:10.1145/1128923
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 June 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fibonacci numbers
  2. watermarking

Qualifiers

  • Article

Conference

VRCIA06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 51 of 107 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2010)A multi-scale triangular mapping and its applications in variation scale scramblingInternational Journal of Computer Applications in Technology10.1504/IJCAT.2010.03414138:1/2/3(74-85)Online publication date: 1-Jul-2010
  • (2009)An Image Encryption Algorithm Based on N-Dimension Affine TransformationProceedings of the 2009 Eigth IEEE/ACIS International Conference on Computer and Information Science10.1109/ICIS.2009.31(579-585)Online publication date: 1-Jun-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media