scispace - formally typeset
Proceedings ArticleDOI

Analysis of feature-based geometry-invariant watermarking

Reads0
Chats0
TLDR
An analysis of feature-based geometry invariant watermarking algorithms through the lens of segmentation based feature point extractors and triangulation based elementary patch formations.
Abstract
In this paper, we present an analysis of feature-based geometry invariant watermarking algorithms. A discussion of the requirements on each building block is followed by potential solutions to meet these requirements. Furthermore, we present theoretical and practical limitations of these solutions via examples. In particular, segmentation based feature point extractors and triangulation based elementary patch formations are evaluated.

read more

Citations
More filters
Journal ArticleDOI

Geometric attacks on image watermarking systems

V. Licks, +1 more
- 01 Jul 2005 - 
TL;DR: In this article, the authors describe the most common types of geometric attacks and survey proposed solutions for image watermarking methods, and present a survey of solutions for different types of attacks.
Journal ArticleDOI

Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking

TL;DR: The watermark presented in this paper not only highlights the utility of the proposed framework for synchronization in feature-based data embedding systems but also represents a significant advance in speech watermarking.
Patent

Digital image watermarking

Martyn Gilbert, +1 more
TL;DR: In this paper, a method of digital watermarking was proposed, in which the watermark is embodded into a first image and it is subsequently attempted to identify the digital watermarks in a second digital image.
Proceedings ArticleDOI

A Image Digital Watermarking based on DWT in Invariant Wavelet Domain

TL;DR: An improved invariant wavelet that is better than the bilinear interpolation is presented, and a novel blind image watermarking algorithm of scalar costa system based on DWT in the rotation- and scale-and translation-(RST) moment invariants wavelet, i.e. RSTMIW domain is designed.
Proceedings ArticleDOI

Watermark Synchronization: Perspectives and a New Paradigm

TL;DR: This paper surveys and classify methods employed for watermark synchronization and highlights some inherent difficulties in synchronization that arise due to the nature of multimedia signals, and proposes a framework that addresses these hurdles in practical applications.
References
More filters
Proceedings ArticleDOI

A Combined Corner and Edge Detector

TL;DR: The problem the authors are addressing in Alvey Project MMI149 is that of using computer vision to understand the unconstrained 3D world, in which the viewed scenes will in general contain too wide a diversity of objects for topdown recognition techniques to work.
Journal ArticleDOI

SUSAN—A New Approach to Low Level Image Processing

TL;DR: This paper describes a new approach to low level image processing; in particular, edge and corner detection and structure preserving noise reduction and the resulting methods are accurate, noise resistant and fast.
Journal ArticleDOI

Multimedia watermarking techniques

TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Journal ArticleDOI

Multimedia data-embedding and watermarking technologies

TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Journal ArticleDOI

Rotation, scale and translation invariant spread spectrum digital image watermarking

TL;DR: In this paper, a Fourier-Mellin-based approach is used to construct watermarks which are designed to be unaffected by any combination of rotation and scale transformations, and a novel method of CDMA spread spectrum encoding is introduced which allows one to embed watermark messages of arbitrary length and which need only a secret key for decoding.
Related Papers (5)