Image interpolation and resampling
Handbook of medical imaging
Detection, Estimation, and Modulation Theory: Radar-Sonar Signal Processing and Gaussian Signals in Noise
Modulation and Information Hiding in Images
Proceedings of the First International Workshop on Information Hiding
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
A Shape-Preserving Data Embedding Algorithm for NURBS Curves and Surfaces
CGI '99 Proceedings of the International Conference on Computer Graphics
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Improved spread spectrum: a new modulation technique for robust watermarking
IEEE Transactions on Signal Processing
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
Exposing digital forgeries in color filter array interpolated images
IEEE Transactions on Signal Processing - Part II
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks
IEEE Transactions on Signal Processing - Part II
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
IEEE Transactions on Information Theory
New edge-directed interpolation
IEEE Transactions on Image Processing
Digital watermarking robust to geometric distortions
IEEE Transactions on Image Processing
A new robust watermarking scheme to increase image security
EURASIP Journal on Advances in Signal Processing
Fast communication: Analyzing and removing SureSign watermark
Signal Processing
Hi-index | 0.08 |
Interpolation techniques are often designed to provide a good perceptual quality from known sample values. However, interpolation is essentially considered as a source of decoding errors for watermarking schemes. Conversely, this paper proposes an informed watermarking scheme based on interpolation. This scheme takes advantage of interpolation to generate imperceptible marks in the spatial domain. It can be related to random binning schemes with particular codebook and decoding rule. Theoretical performances are derived and informed embedding strategies are proposed. Two particular implementations based on bilinear and spline interpolation are then applied to image watermarking. The good robustness of these schemes to noise and valumetric attacks is confirmed by simulations. Finally, an attack is specifically designed to check the algorithm security.