A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Robust Watermarking for Images Based on Color Manipulation
[chapter]
2000
Lecture Notes in Computer Science
In this paper we present a new efficient watermarking scheme for images. The basic idea of our method is to alter the colors of the given image in a suitable but imperceptible way. ...
The robustness of the scheme is also theoretically analyzed and it is shown to depend on the number of colors in the image being marked. ...
The authors wish to thank the anonymous referees for their helpful suggestions and comments. ...
doi:10.1007/10719724_21
fatcat:m227ajrzmfamjfo72re63aveuy
Robustness and Imperceptibility Enhancement in Watermarked Images by Color Transformation
[article]
2019
arXiv
pre-print
One of the effective methods for the preservation of copyright ownership of digital media is watermarking. ...
Due to the distribution of image information in the RGB domain, we use the YUV color space, which concentrates the visual information in the Y channel. ...
After that, they manipulate the DCT coefficients based on these adaptive strength factors and watermark bits. Some papers use color image watermarking space conversion to increase robustness. ...
arXiv:1911.00772v1
fatcat:4jxywu4wivebzin24ugspoidkq
Collusion Attack Resistant Watermarking Scheme for Images using DCT
2007
2007 IEEE 15th Signal Processing and Communications Applications
This paper presents a new scheme for hiding a logo-based watermark in colored still image which is inherently collusion attack resistant. ...
Image watermarking with both insensible detection and high robustness capabilities is still a challenging problem for copyright protection up to now. ...
Further research may be conducted on the suitability of color channel based on image characteristics itself. ...
doi:10.1109/siu.2007.4298829
fatcat:f3mkqhrlhbfibnobourovh7kcu
A Novel Authentication Scheme for Lossy Compressed Images
2015
International Journal of Security and Its Applications
On the other side, if geometrical or image processing attacks are applied to the watermarked images, they are then verified successfully as 'not authenticated'. ...
In this paper, a novel scheme is proposed for watermarking lossy compressed images just before transmission and authenticating them once they are received, away from the core of the compression and de-compression ...
Work in [18] proposed a watermarking algorithm based on correlation to authenticate image content. ...
doi:10.14257/ijsia.2015.9.6.29
fatcat:r4zbz4x7svfsfixuucdj4xbuci
BEMD-HT Based RGB Color Image Robust Information Hiding Algorithm Using Block Averaging Technique
2016
International Journal of Signal Processing, Image Processing and Pattern Recognition
We use RGB color image as a cover image. The cover image is divided into a number of blocks. ...
The experimental results of this algorithm demonstrate that the proposed method has better imperceptibility and it is more robust against several image processing and geometric manipulations. ...
As opposed to steganography, digital watermarking has additional requirements of robustness against possible manipulation on watermarked object. ...
doi:10.14257/ijsip.2016.9.12.15
fatcat:23qeztklp5apdgbxctlochqprq
Methods for image authentication: a survey
2007
Multimedia tools and applications
Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. ...
These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content. ...
On the other hand, using edges for content-based signature is undesirable for color images since one may change colors without affecting edges. ...
doi:10.1007/s11042-007-0154-3
fatcat:wwtvlpeyjnck3pj5gcpxakvhfq
An Implementation of Text Hiding in Medical Images based on Graph Coloring for Android Devices
2019
Journal of Physics, Conference Series
In the embedding process, the method used is vector quantization and graph coloring based on a Genetic Algorithm. ...
However, digital image watermarking techniques are usually widely implemented using software running on a computer. ...
[7] developed a tool for portable devices based on Android OS, that permits the addition of a visible or invisible watermark to images. ...
doi:10.1088/1742-6596/1192/1/012008
fatcat:rb5uy3ifmzhbbho4ky2bnkcnge
Analysis of feature-based geometry-invariant watermarking
2001
Security and Watermarking of Multimedia Contents III
Ensuring robustness against geometrical manipulations is a challenging task for watermarking algorithms. ...
Watermarking algorithms that depend on the inherent geometry of the image for synchronization fail ungracefully due to de-synchronization through geometric manipulations. ...
As an example of a global approach, we consider a feature point extraction based on clustering of colors in the image. ...
doi:10.1117/12.435407
dblp:conf/sswmc/CelikS0T01
fatcat:3j3npuxphjb2nfqjdwlhxsimli
FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes
[article]
2022
arXiv
pre-print
Our watermarking framework is designed to be fragile to facial manipulations or tampering while being robust to benign image-processing operations such as image compression, scaling, saturation, contrast ...
For a set of unseen benign and Deepfake manipulations studied in our work, FaceSigns can reliably detect manipulated content with an AUC score of 0.996 which is significantly higher than prior image watermarking ...
For each image, we initialize a mask M h×w×c of all ones. ...
arXiv:2204.01960v1
fatcat:2n7nz2ctcjfvrajscvp3uh3l5q
An Efficient Image Watermarking Approach based on Fourier Transform
2016
International Journal of Computer Applications
This paper presents a new image watermarking approach based on Fourier transform and characteristics of vision system. ...
The original image is partitioned into the non-overlapping blocks. Watermark bits are inserted within the selected coefficients of each block depending on certain condition. ...
Pun. proposed a novel system for image watermarking based on DFT. ...
doi:10.5120/ijca2016908559
fatcat:i7ytoejq4jea7j5aug3prieate
Robust Watermarking Scheme Based on Radius Weight Mean and Feature-Embedding Technique
2013
ETRI Journal
In this paper, the radius weight mean (RWM) and the feature-embedding technique are used to present a novel watermarking scheme for color images. ...
Simulations validate that the stego-images generated by the proposed scheme are robust against most common image-processing operations, such as compression, color quantization, bit truncation, noise addition ...
Acknowledgment I would like to thank the editors and anonymous reviewers for providing valuable comments, which helped to improve the content of the paper. ...
doi:10.4218/etrij.12.0112.0480
fatcat:6w5ny2grunawdpc4ilk2uuc3sy
Restrict Piracy of Videos using DWT-SVD based Video Watermarking
2015
International Journal of Computer Applications
DWT-SVD based video watermarking is relatively a new technology that has been proposed to solve the problem of illegal manipulation and distribution of digital video for example movie piracy. ...
Based on the sub-band selection scores the embedding process is done by using the watermark which are embedding in the cover video watermark. ...
Most these schemes are based on the techniques of image watermarking, but video watermarking has some issues not present in image watermarking. ...
doi:10.5120/ijca2015905229
fatcat:vj437fapwfburcc5uqlw72ypz4
Robust Watermarking Scheme Based on Radius Weight Mean and Feature-Embedding Technique
2013
ETRI Journal
In this paper, the radius weight mean (RWM) and the feature-embedding technique are used to present a novel watermarking scheme for color images. ...
Simulations validate that the stego-images generated by the proposed scheme are robust against most common image-processing operations, such as compression, color quantization, bit truncation, noise addition ...
Acknowledgment I would like to thank the editors and anonymous reviewers for providing valuable comments, which helped to improve the content of the paper. ...
doi:10.4218/etrij.13.0112.0480
fatcat:4qum2xdizngjjly5y4nwzkp4ta
An Effective Robust and Imperceptible Blind Color Image Watermarking using WHT
2020
Journal of King Saud University: Computer and Information Sciences
This paper proposes a new blind color image watermarking based on the Walsh Hadamard Transform (WHT). ...
This proposed method provides more robustness against several manipulations and lossy attacks. ...
An enhanced color image watermarking scheme (Su et al., 2019) is designed based on Schur decomposition. ...
doi:10.1016/j.jksuci.2020.04.003
fatcat:g6d3f2drqrbc7kmsa5dlxxuati
Evaluation of a Fourier Watermarking Method Robustness to Cards Durability Attacks
[chapter]
2014
Lecture Notes in Computer Science
The ID images were watermarked by a new Fourier watermarking method based on print/scan counterattacks (blurring correction and colors restorations) that allows improvement of the robustness of the watermarking ...
In the context of an industrial application for securing identity cards, image watermarking is used to verify the integrity and authenticity of images printed on plastic cards support. ...
The watermark is embedded in ID images using a new watermarking method based on Fourier transform and print-and-scan counterattacks. ...
doi:10.1007/978-3-319-07998-1_32
fatcat:gutd6ghohfbnto7xeuhx377nfq
« Previous
Showing results 1 — 15 out of 2,485 results