<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232012000300010</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[An Improved Robust and Adaptive Watermarking Algorithm Based on DCT]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Wei]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Ministry of Education Dalian University Key Laboratory of Advanced Design and Intelligent Computing]]></institution>
<addr-line><![CDATA[Dalian Liaoning]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2012</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2012</year>
</pub-date>
<volume>10</volume>
<numero>3</numero>
<fpage>405</fpage>
<lpage>415</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232012000300010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232012000300010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232012000300010&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[This paper proposes an improved watermarking algorithm based on DCT (Discrete Cosine Transform). We carried out the algorithm as described as follows. First, we extended both rows and ranks of the watermark by using the proposed method before the embedding stage. After expansion, Sine chaotic system is employed in encrypting the watermark. In the embedding stage, an effective and adaptive embedding method is proposed to embed the watermark into the blocked DCT coefficients. Experimental results demonstrate that the proposed algorithm in this paperworks well in resisting both geometry attack and noise attack. It also does well in recovering the watermark after stego image suffered from JPG compression.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Watermark]]></kwd>
<kwd lng="en"><![CDATA[DCT]]></kwd>
<kwd lng="en"><![CDATA[chaotic]]></kwd>
<kwd lng="en"><![CDATA[adaptive]]></kwd>
<kwd lng="en"><![CDATA[robustness]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>An Improved Robust and Adaptive Watermarking Algorithm Based on DCT</b></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>Q. Zhang*, Y. Li, X. Wei</b></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><i>Key Laboratory of Advanced Design and Intelligent Computing (Dalian University) of Ministry of Education, Dalian, Liaoning 116622 *E&#45;mail:</i> <a href="mailto:jitoledo@ipn.mx">zhangq@dlu. edu.cn</a></font></p>      <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>ABSTRACT</b></font></p>  	    <p align="justify"><font face="verdana" size="2">This paper proposes an improved watermarking algorithm based on DCT (Discrete Cosine Transform). We carried out the algorithm as described as follows. First, we extended both rows and ranks of the watermark by using the proposed method before the embedding stage. After expansion, Sine chaotic system is employed in encrypting the watermark. In the embedding stage, an effective and adaptive embedding method is proposed to embed the watermark into the blocked DCT coefficients. Experimental results demonstrate that the proposed algorithm in this paperworks well in resisting both geometry attack and noise attack. It also does well in recovering the watermark after stego image suffered from JPG compression.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Keywords</b>: Watermark, DCT, chaotic, adaptive, robustness.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v10n3/v10n3a10.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b><i>Acknowledgment</i></b></font></p>  	    <p align="justify"><font face="verdana" size="2">The work was supported by the National High Technology Research and Development Program ("863" Program) of China (No. 2009AA01Z416), the National Natural Science Foundation of China (31170797, 30870573), Program for Changjiang Scholars and Innovative Research Team in University (No.lRT1109), the Program for Liaoning Innovative Research Team in University (No. LT2011018), the Program for Liaoning Excellent Talents in University (No. LR201003), the Program for Liaoning Innovative Research Team in University (No. LT2011018) and by the Program for Liaoning Science and Technology Research in University (No. LS2010179).</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><i><b>References</b></i></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; A. Z. Tirkel, et al. Electronic watermark. Digital image computing Technology and Applications, Macquarie University, 1:666&#45;673, 1993.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4829851&pid=S1665-6423201200030001000001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; Fang Liu, Feng Yang. An improved blind watermarking algorithm based on DCT. Computer Engineering and Applications. 45(13):124&#45;126, 2009.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4829853&pid=S1665-6423201200030001000002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; Bing&#45;Xi Wang. Watermarking Technology, Xi'an publisher of Xi Dian University Xi'an China, 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4829855&pid=S1665-6423201200030001000003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; Guo&#45;Ming Wang, Zheng&#45;Feng Hou. Watermarking scheme base on DCT. Computer Engineering and Design. 29(21):5635&#45;5637, 2008.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4829857&pid=S1665-6423201200030001000004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; Chin&#45;Chen Chang, Chia&#45;Chen Lin, Chun&#45;Sen Tseng, Wei&#45;Liang Tai. Reversible hiding in DCT&#45;based compressed images information Sciences. 177: 2768&#45;2786, 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4829859&pid=S1665-6423201200030001000005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; C.C. Chang, T.S. Chen, L.Z. Chung. A steganographic method based upon JPEG and quantization table modification, Information Sciences 141:123&#45;138, 2002</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4829861&pid=S1665-6423201200030001000006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; M. Iwata, K. Miyake, A. Shiozaki, Digital steganography utilizing features of JPEG images, I&#45; EICE Transactions on Fundamentals E87&#45;A: 929&#45;936, 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4829862&pid=S1665-6423201200030001000007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; Er. Ashish Bansal, Dr. Sarita Singh Bhadauria. Watermarking Using Neural Network and Hiding the trained network within the cover image. Journal of Theoretical and Applied Information Technology, 2008.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4829864&pid=S1665-6423201200030001000008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; Mohammad Ali Bani Younes, Aman Jantan. Image Encryption Using Block&#45;Based Transformation Algorithm. International Journal of Computer Science, 2008.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4829866&pid=S1665-6423201200030001000009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; Sen Yang, Guo Ying Iv. Research on robustness of watermark based on DCT. Tech Vocabulary. 174:28&#45;29, 2010.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4829868&pid=S1665-6423201200030001000010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tirkel]]></surname>
<given-names><![CDATA[A. Z.]]></given-names>
</name>
</person-group>
<source><![CDATA[Electronic watermark. Digital image computing Technology and Applications]]></source>
<year>1993</year>
<volume>1</volume>
<page-range>666-673</page-range><publisher-name><![CDATA[Macquarie University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Fang]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Feng]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An improved blind watermarking algorithm based on DCT]]></article-title>
<source><![CDATA[Computer Engineering and Applications]]></source>
<year>2009</year>
<volume>45</volume>
<numero>13</numero>
<issue>13</issue>
<page-range>124-126</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Bing-Xi]]></given-names>
</name>
</person-group>
<source><![CDATA[Watermarking Technology]]></source>
<year>2003</year>
<publisher-loc><![CDATA[Xi'an ]]></publisher-loc>
<publisher-name><![CDATA[Xi'an publisher of Xi Dian University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Guo-Ming]]></given-names>
</name>
<name>
<surname><![CDATA[Hou]]></surname>
<given-names><![CDATA[Zheng-Feng]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Watermarking scheme base on DCT]]></article-title>
<source><![CDATA[Computer Engineering and Design]]></source>
<year>2008</year>
<volume>29</volume>
<numero>21</numero>
<issue>21</issue>
<page-range>5635-5637</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[Chin-Chen]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Chia-Chen]]></given-names>
</name>
<name>
<surname><![CDATA[Tseng]]></surname>
<given-names><![CDATA[Chun-Sen]]></given-names>
</name>
<name>
<surname><![CDATA[Tai]]></surname>
<given-names><![CDATA[Wei-Liang]]></given-names>
</name>
</person-group>
<source><![CDATA[Reversible hiding in DCT-based compressed images information Sciences]]></source>
<year>2007</year>
<volume>177</volume>
<page-range>2768-2786</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[C.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chung]]></surname>
<given-names><![CDATA[L.Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A steganographic method based upon JPEG and quantization table modification]]></article-title>
<source><![CDATA[Information Sciences]]></source>
<year>2002</year>
<volume>141</volume>
<page-range>123-138</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Iwata]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Miyake]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Shiozaki]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Digital steganography utilizing features of JPEG images]]></article-title>
<source><![CDATA[I- EICE Transactions on Fundamentals]]></source>
<year>2004</year>
<volume>E87-A</volume>
<page-range>929-936</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Er. Ashish]]></surname>
<given-names><![CDATA[Bansal]]></given-names>
</name>
<name>
<surname><![CDATA[Singh Bhadauria]]></surname>
<given-names><![CDATA[Dr. Sarita]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Watermarking Using Neural Network and Hiding the trained network within the cover image]]></article-title>
<source><![CDATA[Journal of Theoretical and Applied Information Technology]]></source>
<year>2008</year>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bani Younes]]></surname>
<given-names><![CDATA[Mohammad Ali]]></given-names>
</name>
<name>
<surname><![CDATA[Jantan]]></surname>
<given-names><![CDATA[Aman]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Image Encryption Using Block-Based Transformation Algorithm]]></article-title>
<source><![CDATA[International Journal of Computer Science]]></source>
<year>2008</year>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Sen]]></given-names>
</name>
<name>
<surname><![CDATA[Ying Iv]]></surname>
<given-names><![CDATA[Guo]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Research on robustness of watermark based on DCT]]></article-title>
<source><![CDATA[Tech Vocabulary]]></source>
<year>2010</year>
<volume>174</volume>
<page-range>28-29</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
