Journal ArticleDOI
Robust image watermarking in the spatial domain
Nikos Nikolaidis,Ioannis Pitas +1 more
Reads0
Chats0
TLDR
A copyright protection method that is based on hiding an ‘invisible’ signal, known as digital watermark, in the image is presented and a variation that generates image dependent watermarks as well as a method to handle geometrical distortions are presented.About:
This article is published in Signal Processing.The article was published on 1998-05-01. It has received 542 citations till now. The article focuses on the topics: Watermark & Digital watermarking.read more
Citations
More filters
Journal ArticleDOI
Enhancement of image watermark retrieval based on genetic algorithms
Frank Y. Shih,Yi-Ta Wu +1 more
TL;DR: A novel technique based on genetic algorithms (GAs) is presented in this paper to correct fragile-watermarking rounding errors and develops an initial chromosome by comparing the difference between the original image and the rounded watermarked image to speed up the process.
Journal ArticleDOI
A wavelet-tree-based watermarking method using distance vector of binary cluster
TL;DR: The experimental results show that the watermarked image looks visually identical to the original and the watermark can be effectively extracted upon image processing attacks.
Journal ArticleDOI
Performance evaluation of moment-based watermarking methods: A review
TL;DR: Experimental results show that moment's order calibration along with specific moment families enhances methods' performances and brings forth better tradeoffs between robustness and imperceptibility.
Proceedings ArticleDOI
Watermarking polygonal lines using Fourier descriptors
TL;DR: This work presents a method for embedding and detecting watermarks in vector graphics images containing polygonal lines, and presents results from simulated attacks.
Journal ArticleDOI
Robust copyright protection scheme for digital images using overlapping DCT and SVD
Xiaotian Wu,Wei Sun +1 more
TL;DR: A robust lossless copyright protection scheme, based on overlapping discrete cosine transform (DCT) and singular value decomposition (SVD), is presented, demonstrating the robustness of the proposed scheme against different image-manipulation attacks.
References
More filters
Book
Probability, random variables and stochastic processes
TL;DR: This chapter discusses the concept of a Random Variable, the meaning of Probability, and the axioms of probability in terms of Markov Chains and Queueing Theory.
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
The JPEG still picture compression standard
TL;DR: The Baseline method has been by far the most widely implemented JPEG method to date, and is sufficient in its own right for a large number of applications.
Journal ArticleDOI
The JPEG still picture compression standard
TL;DR: The author provides an overview of the JPEG standard, and focuses in detail on the Baseline method, which has been by far the most widely implemented JPEG method to date, and is sufficient in its own right for a large number of applications.