A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2009; you can also visit the original URL.
The file type is application/pdf
.
Filters
Feature-Based Image Watermarking Method Using Scale-Invariant Keypoints
[chapter]
2005
Lecture Notes in Computer Science
This paper describes a feature-based watermarking method based on scale-invariant keypoints. ...
We perform an intensive simulation in comparison with other feature-based watermarking methods using 100 test images. ...
This paper describes a new feature-based watermarking method using scale-invariant keypoints. ...
doi:10.1007/11582267_28
fatcat:uoqivrqgnfhytm6h2jy44r6zj4
Evaluation of Feature Extraction Techniques for Robust Watermarking
[chapter]
2005
Lecture Notes in Computer Science
This paper reviews feature extraction techniques that have been used in featurebased watermarking: the Harris corner detector and the Mexican Hat wavelet scale interaction method. ...
Experimental results show that the scale-invariant keypoint extractor is appropriate for robust watermarking. ...
Therefore, scale-invariant keypoints may be useful to design robust watermarking. ...
doi:10.1007/11551492_32
fatcat:lvklsqnq6rc4xh6xdwcklfj45y
Comparison of Feature Extraction Techniques for Watermark Synchronization
[chapter]
2005
Lecture Notes in Computer Science
This paper reviews feature extraction techniques in feature-based watermarking: the Harris corner detector and the Mexican Hat wavelet scale interaction method. ...
We evaluate the scale-invariant keypoint extractor in comparison with others. After feature extraction, the set of triangles is generated by Delaunay tessellation. ...
This paper reviews feature extraction techniques used in feature-based watermarking and evaluates the scale-invariant keypoint extractor in comparison with other techniques. ...
doi:10.1007/11554028_43
fatcat:t3m4hxa3vveyzcgklup4debv4u
Geometrically Invariant Object-Based Watermarking using SIFT Feature
2007
2007 IEEE International Conference on Image Processing
In this paper, we have developed a robust object-based watermarking algorithm using the scale-invariant feature transform (SIFT) features in conjunction with a new data embedding method based on Discrete ...
Experimental results demonstrated that our proposed algorithm is very robust to geometrical distortions such as JPEG compression, scaling, rotation, shearing, aspect ratio change, image filtering, and ...
SCALE-INVARIANT FEATURE TRANSFORM Scale-Invariant Feature Transform (SIFT) [1] is an algorithm for extracting distinctive features from images. ...
doi:10.1109/icip.2007.4379868
dblp:conf/icip/PhamMYA07
fatcat:rhjgz7ec55hvjftojr6ihxznoi
RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform
2017
Algorithms
Before the watermarking extraction, the keypoints are selected by scale-invariant feature transform (SIFT) in the original image and attacked image. ...
Currently, most digital image watermarking schemes are affected by geometric attacks like rotation, scaling, and translation (RST). ...
SIFT Algorithm Lowe [20] proposed to extract the local scale-invariant feature keypoints of descriptors, and use these descriptors for the matching of two related images. ...
doi:10.3390/a10020041
fatcat:3542u447wbhdxmox5asgti3fue
Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT
2021
Sensors
This paper proposes a screen-shooting resilient watermarking scheme via learned invariant keypoints and QT; that is, if the watermarked image is displayed on the screen and captured by a camera, the watermark ...
First we applied FRFS to locate the embedding feature regions which are decided by the keypoints that survive screen-shooting. Second, we structured watermark embedding regions centered at keypoints. ...
invariant feature transform
SURF
Speeded up robust features
BRISK
Binary robust invariant scalable keypoints
FAST
Features from accelerated segment test
BRIEF
Binary robust independent elementary ...
doi:10.3390/s21196554
pmid:34640870
pmcid:PMC8512442
fatcat:vfx5qwugxrgspgxmw6rpes6g5u
Copy-Move Forgery Detection using DCT and SIFT
2013
International Journal of Computer Applications
It is analyzed that block-based features method DCT is robust to Gaussian noise and JPEG compression, secondly the keypoint-based feature method SIFT is robust to rotation and scaling. ...
General Terms Digital Image Forensics. Keywords Digital image forensics, copy-move forgery, keypoint-based and block-based methods, SIFT and DCT. ...
[7] , proposed the method of detection using scale invariant feature transform (SIFT) keypoint. It detects the keypoint and match them using nearest neighbour search. ...
doi:10.5120/11977-7847
fatcat:leoie3nfsfgd7gd3c3y2gtxfve
A Feature-Based Robust Watermarking Scheme Using Circular Invariant Regions
2013
Journal of Korea Multimedia Society
This paper addresses a feature-based robust watermarking scheme for digital images using a local invariant features of SURF (Speeded-Up Robust Feature) descriptor. ...
These methods enhance the robustness since the circular watermark is inserted into the selected non-overlapping feature regions instead of entire image contents. ...
In this paper, we propose a robust feature-based watermarking scheme using circular invariant regions of SURF descriptor [18] . ...
doi:10.9717/kmms.2013.16.5.591
fatcat:7vo5ilpin5hvjh4us6kpgztsly
FEATURE-BASED DIGITAL WATERMARKING FOR REMOTE SENSING IMAGES
2012
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
This kind of feature points are commonly invariant to Image rotation, scaling and translation, therefore they naturally fit into the requirement of geometrically robust image watermarking. ...
In this study, a novel digital watermarking algorithm based on the scale-space feature points is applied to the remote sensing images, and the robustness of the embedded digital watermark and the impact ...
For this reason, the scale-invariant feature transform (SIFT) is used to detect the scale-space feature points, than some non-overlapped circular regions surrounding the feature points are selected to ...
doi:10.5194/isprsarchives-xxxix-b3-473-2012
fatcat:mcmhrr3ru5cklfzcn5mb7qrlsa
Improvement of SURF against Geometrical Distortions
2018
Journal of Computers
Feature extraction is useful to stitch the panoramic images and SIFT and SURF are the most popular algorithms to extract unique features from the images. ...
The pre-processor transforms the target image into RST invariant domain. In the case of the original SURF, the number of the feature matching is decreased as long as the rotation angle is increasing. ...
Scale Invariant Feature Transform [12] The SIFT can extract image features that are invariant to scale and rotation. ...
doi:10.17706/jcp.13.4.442-449
fatcat:kjonnr4ryvajvggrhffal6iz2u
Survey on Keypoint Based Copy-move Forgery Detection Methods on Image
2016
Procedia Computer Science
In this paper we survey on different keypoint based copy-move forgery detection methods with different parameters. ...
Image is forged by using different techniques but in that most common technique is copy-move forgery. ...
Last type of copy-move forgery is keypoint based methods in which SIFT(Scale Invariant Feature Transform), MIFT(Mirror reflection Invariant Feature Transform) and SURF (Speed up Robust Feature) are used ...
doi:10.1016/j.procs.2016.05.213
fatcat:6cijmazj2fdt7evuuy55u2fhzq
Robust Object-Based Watermarking Using Feature Matching
2008
IEICE transactions on information and systems
We present a robust object-based watermarking algorithm using the scale-invariant feature transform (SIFT) in conjunction with a data embedding method based on Discrete Cosine Transform (DCT). ...
digital watermarking, geometrically invariant, scale-invariant feature transform, object matching Fig. ...
Scale-Invariant
Feature
Transform
Scale-Invariant
Feature
Transform
(SIFT)
[2] is an
algo-
rithm
for extracting
distinctive
features
from
images. ...
doi:10.1093/ietisy/e91-d.7.2027
fatcat:amey4a7b5fhd5loofmoadtlgya
Performance Enhancement of Patch-based Descriptors for Image Copy Detection
2016
International Journal of Advanced Computer Science and Applications
To address these problems, copy detection system based on local features are widely used. Initially, keypoints are detected and represented by some robust descriptors. ...
Distribution of these duplicated and transformed images cause a lot of problems and challenges such as piracy, redundancy, and content-based image indexing and retrieval. ...
The patch size of each keypoint is selected based on their scale to make keypoint scale invariant. ...
doi:10.14569/ijacsa.2016.070361
fatcat:z3mpunoelrhcvfkz4y7enwtwaq
Passive Image Forensic Method to detect Copy Move Forgery in Digital Images
2014
IOSR Journal of Computer Engineering
In this paper, the passive image forensic method is presented to detect copy move forgery in digital images. The proposed method is based on SURF (Speed Up Robust Features) algorithm. ...
This detection method is found to be rotation and scale invariant and is robust enough to noise, jpeg compression and blurring. Multiple copy move forgery is also detected by this method. ...
[6] proposes a method that is based on Scale Invariant Feature Transform (SIFT). ...
doi:10.9790/0661-1621296104
fatcat:nvkeyvmbfbc6zojfdk3r6ypxfq
Authentication of Medical Images using Passive Approach
2019
IET Image Processing
In this study, a non-intrusive procedure for verification of the medical images is proposed in which the polar cosine transform is used for feature extraction and the PatchMatch algorithm to locate the ...
The watermarking techniques are utilised to keep the integrity of medical images intact. ...
We have adopted a keypoint-based forgery detection technique based on scale invariant feature transform (SIFT) features to locate the forgery. ...
doi:10.1049/iet-ipr.2018.6035
fatcat:httwvm26vfhwdj2cevjqxtv2q4
« Previous
Showing results 1 — 15 out of 246 results