680 Hits in 4.6 sec

Robust watermarking of facial images based on salient geometric pattern matching

A. Nikolaidis, I. Pitas
2000 IEEE transactions on multimedia  
We introduce a novel method for embedding and detecting a chaotic watermark in the digital spatial domain of color facial images, based on localizing salient facial features.  ...  These features define a certain area on which the watermark is embedded and detected.  ...  Consequently, the robustness of the localization of the spatial features after several attacks on the watermarked image ensures the robustness of the detection process.  ... 
doi:10.1109/6046.865482 fatcat:mpw6rfrqkrgzxgkz3uebzsxaeq

Proficient Hash Sensitivity Growth for Optimized Image Forgery Detection

K. Anitha, P. Leveen Bose
2014 International Journal of Computer Applications Technology and Research  
both the local and global features of an image (when considering the whole image it is global and when considering only the specific part of an image it is local) and based on this a technique is proposed  ...  hash, as the sensitivity of the hash is increased it can accurately detect even smaller area tampering and it is robust to normal image processing.  ...  A watermark is of two types, visible watermarking and invisible watermarking. One of the major disadvantages of watermarking is that it will deform the content.  ... 
doi:10.7753/ijcatr0311.1002 fatcat:2qfwekwxsfbrvfiivkanelknty

Digital Image Watermarking in Robust Feature Region Set

Seema Malshe, Hitesh Gupta, Mukesh Kumar Baghel
2012 International Journal of Computer Applications  
Digital image watermarking is widely used for copyright protection of digital information.  ...  The effectiveness of a digital watermarking technique is indicated by the robustness of embedded watermarks against various attacks.  ...  salient local image patches.  ... 
doi:10.5120/8843-3146 fatcat:dtwltinm35axhnvjvyibiu7xte

Feature based Image Authentication using Symmetric Surround Saliency Mapping in Image Forensics

Meenakshi SundaramA., C. Nandini
2014 International Journal of Computer Applications  
A robust image hashing mechanism must be robust to image processing operations as well as geometric distortions.  ...  For an efficient image security, image hashing is one of the solutions for image authentication.  ...  We extract the local texture features such as contrast, coarseness, skew and kurtosis from the salient regions in the image, which represents the image contents in the corresponding areas.  ... 
doi:10.5120/18266-9289 fatcat:csa5mstsvjayvclzexguoukrz4

Redundant-wavelet watermarking with pixel-wise masking

K.M. Parker, J.E. Fowler
2005 IEEE International Conference on Image Processing 2005  
energy so as to minimize the impact on perceptual image quality.  ...  Specifically, in the proposed method, the redundancy inherent in the transform facilitates detection of perceptually salient texture local to a given spatial location and guides the placement of watermarking  ...  Spread-spectrum watermarking [1] , one of the most popular methods for image watermarking, embeds a whitenoise watermark into transform coefficients of an image and verifies the presence of the watermark  ... 
doi:10.1109/icip.2005.1529843 dblp:conf/icip/ParkerF05 fatcat:gp5mvla6vfd6tofds2au2dq2ze

An Adaptive Visible Watermark Embedding Method based on Region Selection

Wenfa Qi, Yuxin Liu, Sirui Guo, Xiang Wang, Zongming Guo
2021 Security and Communication Networks  
Firstly, the salient region of the host image is detected based on superpixel detection.  ...  The experimental results show that our proposed method improves the robustness of visible watermarking technology and greatly reduces the risk of malicious removal of visible watermark image.  ...  Firstly, the salient region of the host image is detected based on superpixel detection.  ... 
doi:10.1155/2021/6693343 doaj:cc66b1b3f62441d8afd4338cca4a2c56 fatcat:2y7bl4rqm5cvpc7m64f4dulstm


M. N. Favorskaya, V. V. Buryachenko
2021 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
We embed one or more watermarks using relevant large-sized patches according to two main criteria: high texturing in still images and high texturing/non-significant motion in videos.  ...  In this case, the watermarking scheme does not differ from conventional techniques, including the advanced ones based on adaptive paradigms, deep learning, multi-level protection, and so on.  ...  To estimate the level of texturing, a combination of different approaches (the first way) was used: Local Entropy, Local Standard Deviation, and Local Range, on the basis of which a texture mask was built  ... 
doi:10.5194/isprs-archives-xliv-2-w1-2021-47-2021 fatcat:6j3kyxm7kbgivj57bepwh24byq

A Novel STDM Watermarking Using Visual Saliency-Based JND Model

Chunxing Wang, Teng Zhang, Wenbo Wan, Xiaoyue Han, Meiling Xu
2017 Information  
Consequently, JND needs to be adjusted to the salient areas in images. Salient areas are generally regarded as the attention focus in human eyes.  ...  Extensive experiments performed on the classic image databases demonstrate that the proposed watermarking scheme works better in terms of the robustness than other related methods. rate-distortion-robustness  ...  First, VS is used as a feature when computing the local quality map of the distorted image.  ... 
doi:10.3390/info8030103 fatcat:hzka2y4l6bfj3dn6eq5tgxgea4

Robust Adaptive Watermarking Based on Image Contents Using Wavelet Technique

A. K. Verma, C. Patvardhan, C. Vasantha Lakshmi
2015 International Journal of Image Graphics and Signal Processing  
for robust watermarking.  ...  A good watermarking scheme should be able to perform equally well on all types of images irrespective of image contents because practically watermarking has to be applied to images of all types.  ...  In this scheme, Watermark is embedded in the areas represented by the salient features of the image. It is shown that in an image, Salient features are resistive to the geometrical attacks.  ... 
doi:10.5815/ijigsp.2015.02.07 fatcat:bnba3gsvyrahhmxx4h2x3ecs4u


Meenakshi S, Akila C
2011 International Journal on Information Sciences and Computing  
This paper presents an effective method for the image watermarking using visual perception model based on statistical features in the low frequency domain.  ...  In the image watermarking community watermark resistance to geometric attacks is an important issue.  ...  One of the most prominent applications of watermarking is using robust and practical watermarking to protect image and video data [1] .  ... 
doi:10.18000/ijisac.50086 fatcat:kbpk2t24bzcvvlptknc3ouwg7u

Toward Robust Logo Watermarking Using Multiresolution Image Fusion Principles

D. Kundur, D. Hatzinakos
2004 IEEE transactions on multimedia  
This paper presents a novel robust watermarking approach called FuseMark based on the principles of image fusion for copy protection or robust tagging applications.  ...  A human visual system model based on contrast sensitivity is incorporated to hide a higher energy hidden logo in salient image components.  ...  the attacks on the watermarked image blocks as locally stationary AWGN.  ... 
doi:10.1109/tmm.2003.819747 fatcat:hwpyq42hrffphjd2wosq7v2nm4

Region-based image watermarking

A. Nikolaidis, I. Pitas
2001 IEEE Transactions on Image Processing  
We introduce a novel method for embedding and detecting a chaotic watermark in the digital spatial image domain, based on segmenting the image and locating regions that are robust to several image manipulations  ...  The robustness of the method is confirmed by experimental results that display the immunity of the embedded watermark to several kinds of attacks, such as compression, filtering, scaling, cropping, and  ...  Consequently the robustness of the localization of the spatial features after various attacks on the watermarked image ensures the robustness of the detection process.  ... 
doi:10.1109/83.967400 pmid:18255514 fatcat:vzgg7y7szrg33ngkcg3vbc6mz4

A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection [chapter]

Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni, Hocine Cherifi
2019 Lecture Notes in Computer Science  
The choice of these vertices is based on 3-D mesh saliency to achieve watermark robustness while ensuring high imperceptibility.  ...  Nowadays, the majority of robust 3-D watermarking approaches have mainly focused on the robustness against attacks while the imperceptibility of these techniques is still a serious challenge.  ...  Moreover, in contrast with 2-D image, there is no obvious robust intrinsic ordering for 3-D mesh elements, which make the use of spectral analysis watermarking of 2-D images impossible.  ... 
doi:10.1007/978-3-030-22885-9_19 fatcat:fskl6vtiofcallq7u36mayqroq

Global motion compensated visual attention-based video watermarking

Matthew Oakes, Deepayan Bhowmik, Charith Abhayaratne
2016 Journal of Electronic Imaging (JEI)  
into the host image according to the visual attentiveness of each region.  ...  Imperceptibility and robustness are two key but complementary requirements of any watermarking algorithm. Low-strength watermarking yields high imperceptibility but exhibits poor robustness.  ...  Our previous work 30, 31 shows the exploitation of image saliency in achieving image watermarking robustness.  ... 
doi:10.1117/1.jei.25.6.061624 fatcat:q7gic5pm5rerjls4elofkwuu5q

Image watermarking with feature point based synchronization robust to print–scan attack

A. Keskinarkaus, A. Pramila, T. Seppänen
2012 Journal of Visual Communication and Image Representation  
In this paper we propose a content based multibit watermarking method robust to print-scan attack. A method to extract feature points, robust in terms of watermarking, is proposed.  ...  The location of the watermark is tied to a coordinate system defined by robust feature points.  ...  Watermark detection is based on a local threshold on normalized correlation to detect if a disk has been watermarked, as well as on global threshold to detect if the image has been watermarked.  ... 
doi:10.1016/j.jvcir.2012.01.010 fatcat:fomsacys3jccxdofg5kljyk4ue
« Previous Showing results 1 — 15 out of 680 results