| As an effective means to resist the copyright problem of images in the process of network transmission,image digital watermarking technology has been studied for many years.However,the existing watermarking algorithm scheme still cannot fully meet the design requirements of the algorithm scheme.Therefore,in view of the robustness of the digital watermarking algorithm of color images in multi-frequency domains and the security of watermarked images,two watermarking algorithms for digital image copyright protection are proposed:(1)Image digital watermarking algorithm based on DWT-DCT-SVD.The scheme is based on a mixture of three advanced transformations: DCT(discrete cosine transform,discrete cosine transform),DWT(discrete wavelet transform,discrete wavelet transform)and SVD(sing Ular value decomposition),first perform multiple DWT on the carrier image,select the embedded subband for DCT,and then perform SVD at the same time as the watermark image,select the appropriate embedding intensity to operate on the two singular values to realize the embedding of the watermark.Enter.Combine the characteristics and advantages of these three transformations to select the appropriate watermark embedding position and embedding intensity,and finally meet the design requirements of concealment and robustness of the watermark scheme.(2)Image digital watermarking algorithm based on DWT-SVD and Heisenberg decomposition.The host image is decomposed into multiple subbands through multi-level wavelet transform,and then the obtained subband coefficient is used as the input of Heisenberg decomposition.At the same time,the watermark image is decomposed by singular values,the appropriate watermark embedding position and embedding intensity are selected,and the watermark is embedded in the host image.The watermark is extracted through the corresponding extraction algorithm.The security of the watermark images of the two watermarking algorithms is guaranteed by the double encryption of the Arnold transform and the logistic chaotic mapping.These two schemes were used to experiment on different types of images.The simulation results show that compared with the existing scheme,both schemes have strong concealment,and have strong robustness for attacks such as adding noise,JPEG compression,filtering attack,histogram equalization,sharpening,amplification and cropping.In addition,the comparative experimental results show that the scheme performs better than the existing scheme. |