메뉴 건너뛰기




Volumn 20, Issue 2, 2005, Pages 129-150

Towards robust image watermarking: Combining content-dependent key, moment normalization, and side-informed embedding

Author keywords

Attack; Content dependent watermark; Moment normalization; Robustness; Side information; Watermarking

Indexed keywords

ATTACK; CONTENT-DEPENDENT WATERMARK; MOMENT NORMALIZATION; SIDE INFORMATION; WATERMAKING;

EID: 11244354252     PISSN: 09235965     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.image.2004.10.002     Document Type: Article
Times cited : (19)

References (38)
  • 3
    • 0036709226 scopus 로고    scopus 로고
    • Geometrically invariant watermarking using feature points
    • P. Bas, J.M. Chassery, and B. Macq Geometrically invariant watermarking using feature points IEEE Trans. Image Process. 11 9 2002 1014 1028
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.9 , pp. 1014-1028
    • Bas, P.1    Chassery, J.M.2    Macq, B.3
  • 4
    • 0030257652 scopus 로고    scopus 로고
    • Near optimum error correcting coding and decoding: Turbo-codes
    • C. Berrou, and A. Glavieux Near optimum error correcting coding and decoding turbo-codes IEEE Trans. Commun. 10 1996 1261 1271
    • (1996) IEEE Trans. Commun. , vol.10 , pp. 1261-1271
    • Berrou, C.1    Glavieux, A.2
  • 7
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communications with side information
    • I.J. Cox, M.L. Miller, and A. McKellips Watermarking as communications with side information Proc. IEEE 87 7 1999 1127 1141
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.J.1    Miller, M.L.2    McKellips, A.3
  • 12
    • 0032634857 scopus 로고    scopus 로고
    • Multimedia watermarking techniques
    • F. Hartung, and M. Kutter Multimedia watermarking techniques Proc. IEEE 87 1999 1079 1107
    • (1999) Proc. IEEE , vol.87 , pp. 1079-1107
    • Hartung, F.1    Kutter, M.2
  • 14
    • 11244284466 scopus 로고    scopus 로고
    • A geometric-resilient image hashing system and its application scalability
    • Magdeburg Germany
    • C.Y. Hsu, and C.S. Lu A geometric-resilient image hashing system and its application scalability Proceedings of the ACM Multimedia and Security Workshop 2004 Magdeburg Germany 81 92
    • (2004) Proceedings of the ACM Multimedia and Security Workshop , pp. 81-92
    • Hsu, C.Y.1    Lu, C.S.2
  • 19
    • 0018998148 scopus 로고
    • Digital image enhancement and noise filtering by use of local statistics
    • J.S. Lee Digital image enhancement and noise filtering by use of local statistics IEEE Trans. Pattern Anal. Machine Intell. 2 2 1980 165 168
    • (1980) IEEE Trans. Pattern Anal. Machine Intell. , vol.2 , Issue.2 , pp. 165-168
    • Lee, J.S.1
  • 21
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from mahcious manipulation
    • C.Y. Lin, and S.F. Chang A robust image authentication method distinguishing JPEG compression from mahcious manipulation IEEE Trans. Circuits Systems Video Technol. 11 2 2001 153 168
    • (2001) IEEE Trans. Circuits Systems Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 23
    • 0036504565 scopus 로고    scopus 로고
    • Denoising and copy attacks resilient watermarking by exploiting knowledge at detector
    • C.S. Lu, H.Y. Mark Liao, and M. Kutter Denoising and copy attacks resilient watermarking by exploiting knowledge at detector IEEE Trans. Image Process. 11 3 2002 280 292
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.3 , pp. 280-292
    • Lu, C.S.1    Mark Liao, H.Y.2    Kutter, M.3
  • 24
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • C.S. Lu, and H.Y. Mark Liao Structural digital signature for image authentication an incidental distortion resistant scheme IEEE Trans. Multimedia 5 2 2003 161 173
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.S.1    Mark Liao, H.Y.2
  • 27
    • 33750537415 scopus 로고    scopus 로고
    • Robust mesh-based content-dependent image watermarking with resistance to both geometric attack and watermark-estimation attack
    • San Jose, CA, USA
    • C.S. Lu, S.W. Sun, P.C. Chang, Robust mesh-based content-dependent image watermarking with resistance to both geometric attack and watermark-estimation attack, Proceedings of the SPIE: Security, Steganography, and Watermarking of Multimedia Contents, VII (EI120), San Jose, CA, USA, 2005.
    • (2005) Proceedings of the SPIE: Security, Steganography, and Watermarking of Multimedia Contents , vol.7 , Issue.EI120
    • Lu, C.S.1    Sun, S.W.2    Chang, P.C.3
  • 28
    • 0036727622 scopus 로고    scopus 로고
    • Analysis of pilot-based synchronization algorithms for watermarking of still images
    • A.R. Manuel, and P.G. Fernando Analysis of pilot-based synchronization algorithms for watermarking of still images Signal Process. Image Commun. 17 2002 611 633
    • (2002) Signal Process. Image Commun. , vol.17 , pp. 611-633
    • Manuel, A.R.1    Fernando, P.G.2
  • 30
    • 0029493264 scopus 로고
    • Image normalization for pattern recognition
    • S.C. Pei, and C.N. Lin Image normalization for pattern recognition Image Vision Comput. 13 10 1995 711 723
    • (1995) Image Vision Comput. , vol.13 , Issue.10 , pp. 711-723
    • Pei, S.C.1    Lin, C.N.2
  • 31
    • 0033726714 scopus 로고    scopus 로고
    • Robust template matching for affine resistant image watermarks
    • S. Pereira, and T. Pun Robust template matching for affine resistant image watermarks IEEE Trans. Image Process. 9 2000 1123 1129
    • (2000) IEEE Trans. Image Process. , vol.9 , pp. 1123-1129
    • Pereira, S.1    Pun, T.2
  • 33
    • 0032074148 scopus 로고    scopus 로고
    • Rotation, scale, and translation invariant spread spectrum digital image watermarking
    • J.J.K. O'Ruanaidh, and T. Pun Rotation, scale, and translation invariant spread spectrum digital image watermarking Signal Processing 66 3 1998 303 317
    • (1998) Signal Processing , vol.66 , Issue.3 , pp. 303-317
    • O'Ruanaidh, J.J.K.1    Pun, T.2
  • 34
  • 37
    • 0035369792 scopus 로고    scopus 로고
    • Attack modelling: Towards a second generation watermarking benchmark
    • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun Attack modelling towards a second generation watermarking benchmark Signal Processing 81 2001 1177 1214
    • (2001) Signal Processing , vol.81 , pp. 1177-1214
    • Voloshynovskiy, S.1    Pereira, S.2    Iquise, V.3    Pun, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.