Watermarking technique for the image is an efficient method for protecting copyright image, and also a huge topic in cryptography. In this paper, two spread spectrum watermarking scheme, the Convolution Image-based Model (CIM) and the Exponential Convolution Image-based Model (ECIM) are going to be formulated and discussed. The watermarking experiment result will be shown and discussed, focusing on the attack scheme, protectability, and the information encryption of the watermark. We will show that the convolution image-based model for invisible watermark is weak of protectability, but it is able to hide the information (the size of watermark must be less than the original image) and store inside the image.
We describe what mimetic interpolation is and why it is critical for some pre- and post-processing tasks. A simple test case shows how using bilinear interpolation for a flux calculation introduces numerical errors that depend on the grid, the number of segments and the number of quadrature points. In contrast, mimetic interpolation will return the exact result regardless of the grid resolution and the number of segments.
Alex Pletzer and Wolfgang Hayek and Jorge Bornemann