Filters








246 Hits in 9.2 sec

Feature-Based Image Watermarking Method Using Scale-Invariant Keypoints [chapter]

Hae-Yeoun Lee, Choong-hoon Lee, Heung-Kyu Lee, Jeho Nam
2005 Lecture Notes in Computer Science  
This paper describes a feature-based watermarking method based on scale-invariant keypoints.  ...  We perform an intensive simulation in comparison with other feature-based watermarking methods using 100 test images.  ...  This paper describes a new feature-based watermarking method using scale-invariant keypoints.  ... 
doi:10.1007/11582267_28 fatcat:uoqivrqgnfhytm6h2jy44r6zj4

Evaluation of Feature Extraction Techniques for Robust Watermarking [chapter]

Hae-Yeoun Lee, In Koo Kang, Heung-Kyu Lee, Young-Ho Suh
2005 Lecture Notes in Computer Science  
This paper reviews feature extraction techniques that have been used in featurebased watermarking: the Harris corner detector and the Mexican Hat wavelet scale interaction method.  ...  Experimental results show that the scale-invariant keypoint extractor is appropriate for robust watermarking.  ...  Therefore, scale-invariant keypoints may be useful to design robust watermarking.  ... 
doi:10.1007/11551492_32 fatcat:lvklsqnq6rc4xh6xdwcklfj45y

Comparison of Feature Extraction Techniques for Watermark Synchronization [chapter]

Hae-Yeoun Lee, Heung-Kyu Lee, Junseok Lee
2005 Lecture Notes in Computer Science  
This paper reviews feature extraction techniques in feature-based watermarking: the Harris corner detector and the Mexican Hat wavelet scale interaction method.  ...  We evaluate the scale-invariant keypoint extractor in comparison with others. After feature extraction, the set of triangles is generated by Delaunay tessellation.  ...  This paper reviews feature extraction techniques used in feature-based watermarking and evaluates the scale-invariant keypoint extractor in comparison with other techniques.  ... 
doi:10.1007/11554028_43 fatcat:t3m4hxa3vveyzcgklup4debv4u

Geometrically Invariant Object-Based Watermarking using SIFT Feature

Viet Quoc Pham, Takashi Miyaki, Toshihiko Yamasaki, Kiyoharu Aizawa
2007 2007 IEEE International Conference on Image Processing  
In this paper, we have developed a robust object-based watermarking algorithm using the scale-invariant feature transform (SIFT) features in conjunction with a new data embedding method based on Discrete  ...  Experimental results demonstrated that our proposed algorithm is very robust to geometrical distortions such as JPEG compression, scaling, rotation, shearing, aspect ratio change, image filtering, and  ...  SCALE-INVARIANT FEATURE TRANSFORM Scale-Invariant Feature Transform (SIFT) [1] is an algorithm for extracting distinctive features from images.  ... 
doi:10.1109/icip.2007.4379868 dblp:conf/icip/PhamMYA07 fatcat:rhjgz7ec55hvjftojr6ihxznoi

RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform

Yunpeng Zhang, Chengyou Wang, Xiao Zhou
2017 Algorithms  
Before the watermarking extraction, the keypoints are selected by scale-invariant feature transform (SIFT) in the original image and attacked image.  ...  Currently, most digital image watermarking schemes are affected by geometric attacks like rotation, scaling, and translation (RST).  ...  SIFT Algorithm Lowe [20] proposed to extract the local scale-invariant feature keypoints of descriptors, and use these descriptors for the matching of two related images.  ... 
doi:10.3390/a10020041 fatcat:3542u447wbhdxmox5asgti3fue

Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT

Li Li, Rui Bai, Shanqing Zhang, Chin-Chen Chang, Mengtao Shi
2021 Sensors  
This paper proposes a screen-shooting resilient watermarking scheme via learned invariant keypoints and QT; that is, if the watermarked image is displayed on the screen and captured by a camera, the watermark  ...  First we applied FRFS to locate the embedding feature regions which are decided by the keypoints that survive screen-shooting. Second, we structured watermark embedding regions centered at keypoints.  ...  invariant feature transform SURF Speeded up robust features BRISK Binary robust invariant scalable keypoints FAST Features from accelerated segment test BRIEF Binary robust independent elementary  ... 
doi:10.3390/s21196554 pmid:34640870 pmcid:PMC8512442 fatcat:vfx5qwugxrgspgxmw6rpes6g5u

Copy-Move Forgery Detection using DCT and SIFT

Amanpreet Kaur, Richa Sharma
2013 International Journal of Computer Applications  
It is analyzed that block-based features method DCT is robust to Gaussian noise and JPEG compression, secondly the keypoint-based feature method SIFT is robust to rotation and scaling.  ...  General Terms Digital Image Forensics. Keywords Digital image forensics, copy-move forgery, keypoint-based and block-based methods, SIFT and DCT.  ...  [7] , proposed the method of detection using scale invariant feature transform (SIFT) keypoint. It detects the keypoint and match them using nearest neighbour search.  ... 
doi:10.5120/11977-7847 fatcat:leoie3nfsfgd7gd3c3y2gtxfve

A Feature-Based Robust Watermarking Scheme Using Circular Invariant Regions

Munkhbaatar Doyoddorj, Kyung-Hyung Rhee
2013 Journal of Korea Multimedia Society  
This paper addresses a feature-based robust watermarking scheme for digital images using a local invariant features of SURF (Speeded-Up Robust Feature) descriptor.  ...  These methods enhance the robustness since the circular watermark is inserted into the selected non-overlapping feature regions instead of entire image contents.  ...  In this paper, we propose a robust feature-based watermarking scheme using circular invariant regions of SURF descriptor [18] .  ... 
doi:10.9717/kmms.2013.16.5.591 fatcat:7vo5ilpin5hvjh4us6kpgztsly

FEATURE-BASED DIGITAL WATERMARKING FOR REMOTE SENSING IMAGES

P.-H. Hsu, C.-C. Chen
2012 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
This kind of feature points are commonly invariant to Image rotation, scaling and translation, therefore they naturally fit into the requirement of geometrically robust image watermarking.  ...  In this study, a novel digital watermarking algorithm based on the scale-space feature points is applied to the remote sensing images, and the robustness of the embedded digital watermark and the impact  ...  For this reason, the scale-invariant feature transform (SIFT) is used to detect the scale-space feature points, than some non-overlapped circular regions surrounding the feature points are selected to  ... 
doi:10.5194/isprsarchives-xxxix-b3-473-2012 fatcat:mcmhrr3ru5cklfzcn5mb7qrlsa

Improvement of SURF against Geometrical Distortions

Yongbae Kim
2018 Journal of Computers  
Feature extraction is useful to stitch the panoramic images and SIFT and SURF are the most popular algorithms to extract unique features from the images.  ...  The pre-processor transforms the target image into RST invariant domain. In the case of the original SURF, the number of the feature matching is decreased as long as the rotation angle is increasing.  ...  Scale Invariant Feature Transform [12] The SIFT can extract image features that are invariant to scale and rotation.  ... 
doi:10.17706/jcp.13.4.442-449 fatcat:kjonnr4ryvajvggrhffal6iz2u

Survey on Keypoint Based Copy-move Forgery Detection Methods on Image

Devanshi Chauhan, Dipali Kasat, Sanjeev Jain, Vilas Thakare
2016 Procedia Computer Science  
In this paper we survey on different keypoint based copy-move forgery detection methods with different parameters.  ...  Image is forged by using different techniques but in that most common technique is copy-move forgery.  ...  Last type of copy-move forgery is keypoint based methods in which SIFT(Scale Invariant Feature Transform), MIFT(Mirror reflection Invariant Feature Transform) and SURF (Speed up Robust Feature) are used  ... 
doi:10.1016/j.procs.2016.05.213 fatcat:6cijmazj2fdt7evuuy55u2fhzq

Robust Object-Based Watermarking Using Feature Matching

V.-Q. PHAM, T. MIYAKI, T. YAMASAKI, K. AIZAWA
2008 IEICE transactions on information and systems  
We present a robust object-based watermarking algorithm using the scale-invariant feature transform (SIFT) in conjunction with a data embedding method based on Discrete Cosine Transform (DCT).  ...  digital watermarking, geometrically invariant, scale-invariant feature transform, object matching Fig.  ...  Scale-Invariant Feature Transform Scale-Invariant Feature Transform (SIFT) [2] is an algo- rithm for extracting distinctive features from images.  ... 
doi:10.1093/ietisy/e91-d.7.2027 fatcat:amey4a7b5fhd5loofmoadtlgya

Performance Enhancement of Patch-based Descriptors for Image Copy Detection

Junaid Baber, Maheen Bakhtyar, Waheed Noor, Abdul Basit, Ihsan Ullah
2016 International Journal of Advanced Computer Science and Applications  
To address these problems, copy detection system based on local features are widely used. Initially, keypoints are detected and represented by some robust descriptors.  ...  Distribution of these duplicated and transformed images cause a lot of problems and challenges such as piracy, redundancy, and content-based image indexing and retrieval.  ...  The patch size of each keypoint is selected based on their scale to make keypoint scale invariant.  ... 
doi:10.14569/ijacsa.2016.070361 fatcat:z3mpunoelrhcvfkz4y7enwtwaq

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Salma Amtullah, Dr. Ajay Koul
2014 IOSR Journal of Computer Engineering  
In this paper, the passive image forensic method is presented to detect copy move forgery in digital images. The proposed method is based on SURF (Speed Up Robust Features) algorithm.  ...  This detection method is found to be rotation and scale invariant and is robust enough to noise, jpeg compression and blurring. Multiple copy move forgery is also detected by this method.  ...  [6] proposes a method that is based on Scale Invariant Feature Transform (SIFT).  ... 
doi:10.9790/0661-1621296104 fatcat:nvkeyvmbfbc6zojfdk3r6ypxfq

Authentication of Medical Images using Passive Approach

Choudhary Prakash, Hari Om, Sushila Maheshkar
2019 IET Image Processing  
In this study, a non-intrusive procedure for verification of the medical images is proposed in which the polar cosine transform is used for feature extraction and the PatchMatch algorithm to locate the  ...  The watermarking techniques are utilised to keep the integrity of medical images intact.  ...  We have adopted a keypoint-based forgery detection technique based on scale invariant feature transform (SIFT) features to locate the forgery.  ... 
doi:10.1049/iet-ipr.2018.6035 fatcat:httwvm26vfhwdj2cevjqxtv2q4
« Previous Showing results 1 — 15 out of 246 results