scispace - formally typeset
Journal ArticleDOI

A publicly verifiable copyright-proving scheme resistant to malicious attacks

Reads0
Chats0
TLDR
A wavelet-based copyright-proving scheme that does not require the original image for logo verification is proposed and is strong enough to resist malicious manipulations of an image including blurring, JPEG compression, noising, sharpening, scaling, rotation, cropping, scaling-cropping, and print-photocopy-scan attacks.
Citations
More filters
Journal ArticleDOI

Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm

TL;DR: Experimental results indicate that the proposed stereo image zero- watermarking algorithm is strongly robust to various asymmetric and symmetric attacks and has superiority compared with other zero-watermarking algorithms.
Journal ArticleDOI

A blind watermarking method using maximum wavelet coefficient quantization

TL;DR: Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks and can extract the watermark without using the original image or watermark.
Journal ArticleDOI

Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms

TL;DR: Experimental results show that the proposed scheme for color medical image copyright protection based on a chaotic system and quaternion polar harmonic transforms (QPHTs) is robust to geometric attacks and common attacks and that it has better performance than similar lossless watermarking schemes.
Journal ArticleDOI

Adaptive watermark mechanism for rightful ownership protection

TL;DR: This novel approach allows image owners to adjust the strength of watermarks through a threshold, so that the robustness of the watermark can be enhanced and preserves the data lossless requirement, so it is suitable for medical and artistic images.
Journal ArticleDOI

A wavelet-tree-based watermarking method using distance vector of binary cluster

TL;DR: The experimental results show that the watermarked image looks visually identical to the original and the watermark can be effectively extracted upon image processing attacks.
References
More filters
Journal ArticleDOI

An Algorithm for Vector Quantizer Design

TL;DR: An efficient and intuitive algorithm is presented for the design of vector quantizers based either on a known probabilistic model or on a long training sequence of data.
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Embedded image coding using zerotrees of wavelet coefficients

TL;DR: The embedded zerotree wavelet algorithm (EZW) is a simple, yet remarkably effective, image compression algorithm, having the property that the bits in the bit stream are generated in order of importance, yielding a fully embedded code.
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI

Improved wavelet-based watermarking through pixel-wise masking

TL;DR: A new approach to mask the watermark according to the characteristics of the human visual system (HVS) is presented, which is accomplished pixel by pixel by taking into account the texture and the luminance content of all the image subbands.
Related Papers (5)