Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
VHDL design representation and synthesis (2nd ed.)
VHDL design representation and synthesis (2nd ed.)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
An Image Copyright Protection Scheme Based on Torus Automorphism
CW '02 Proceedings of the First International Symposium on Cyber Worlds (CW'02)
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Robustness-set in watermarking embedding systems using codebook classifications
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Controversy Corner: A robust DWT-based copyright verification scheme with Fuzzy ART
Journal of Systems and Software
Dual digital watermarking for internet media based on hybrid strategies
IEEE Transactions on Circuits and Systems for Video Technology
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization
Journal of Visual Communication and Image Representation
A novel data hiding scheme based on modulus function
Journal of Systems and Software
Robust lossless image watermarking based on α-trimmed mean algorithm and support vector machine
Journal of Systems and Software
A zero-watermarking algorithm based on fuzzy adaptive resonance theory
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 3
Copyright authentication for images with a full counter-propagation neural network
Expert Systems with Applications: An International Journal
Embedding capacity raising in reversible data hiding based on prediction of difference expansion
Journal of Systems and Software
An ownership verification scheme by using image pinned field and genetic algorithm
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI
Intelligent reversible watermarking in integer wavelet domain for medical images
Journal of Systems and Software
A robust zero-watermark copyright protection scheme based on DWT and image normalization
PSIVT'11 Proceedings of the 5th Pacific Rim conference on Advances in Image and Video Technology - Volume Part II
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
A novel reversible robust watermarking algorithm based on chaotic system
Digital Signal Processing
A robust zero-watermarking scheme using Canny edge detector
International Journal of Electronic Security and Digital Forensics
Engineering Applications of Artificial Intelligence
Genetic algorithm and difference expansion based reversible watermarking for relational databases
Journal of Systems and Software
Hi-index | 0.00 |
Watermarking is used to protect the integrity and copyright of images. Conventional copyright protection mechanisms; however, are not robust enough or require complex computations to embed the watermark into the host image. In this article, we propose an adaptive copyright protection scheme without the use of discrete cosine transformation (DCT) and discrete wavelet transformation (DWT). This novel approach allows image owners to adjust the strength of watermarks through a threshold, so that the robustness of the watermark can be enhanced. Moreover, our scheme can resist various signal processing operations (such as blurring, JPEG compression, and noising) and geometric transformations (such as cropping, rotation, and scaling). The experimental results show that our scheme outperforms related works in most cases. Specifically, our scheme preserves the data lossless requirement, so it is suitable for medical and artistic images.