Toward online, worldwide access to Vatican Library materials
IBM Journal of Research and Development
Protecting digital media content
Communications of the ACM
Opportunities for watermarking standards
Communications of the ACM
A dual watermarking technique for images
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 2)
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Cocktail Watermarking on Images
IH '99 Proceedings of the Third International Workshop on Information Hiding
Robust Invisible Watermarking of Volume Data Using the 3D DCT
CGI '01 Computer Graphics International 2001
Automatic Identification of Perceptually Important Regions in an Image
ICPR '98 Proceedings of the 14th International Conference on Pattern Recognition-Volume 1 - Volume 1
IBM Systems Journal
A Study of Block-Based Medical Image Watermarking Using a Perceptual Similarity Metric
DICTA '05 Proceedings of the Digital Image Computing on Techniques and Applications
ISM '06 Proceedings of the Eighth IEEE International Symposium on Multimedia
Human visual system based adaptive digital image watermarking
Signal Processing
ViWiD: visible watermarking based defense against phishing
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Energy-Efficient watermark algorithm based on pairing mechanism
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Toward robust logo watermarking using multiresolution image fusion principles
IEEE Transactions on Multimedia
Attacks on digital watermarks: classification, estimation based attacks, and benchmarks
IEEE Communications Magazine
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Analysis and design of watermarking algorithms for improved resistance to compression
IEEE Transactions on Image Processing
Dual domain watermarking for authentication and compression of cultural heritage images
IEEE Transactions on Image Processing
Multipurpose image watermarking algorithm based on multistage vector quantization
IEEE Transactions on Image Processing
Copyright protection for digital image in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A new robust watermarking scheme to increase image security
EURASIP Journal on Advances in Signal Processing
An improved image blind identification based on inconsistency in light source direction
The Journal of Supercomputing
A joint layered scheme for reliable and secure mobile JPEG-2000 streaming
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A new data hiding method via revision history records on collaborative writing platforms
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Secure randomized image watermarking based on singular value decomposition
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
This article presents a novel invisible robust watermarking scheme for embedding and extracting a digital watermark in an image. The novelty lies in determining a perceptually important subimage in the host image. Invisible insertion of the watermark is performed in the most significant region of the host image such that tampering of that portion with an intention to remove or destroy will degrade the esthetic quality and value of the image. One feature of the algorithm is that this subimage is used as a region of interest for the watermarking process and eliminates the chance of watermark removal. Another feature of the algorithm is the creation of a compound watermark using the input user watermark (logo) and attributes of the host image. This facilitates the homogeneous fusion of a watermark with the cover image, preserves the quality of the host image, and allows robust insertion-extraction. Watermark creation consists of two distinct phases. During the first phase, a statistical image is synthesized from a perceptually important subimage of the image. A compound watermark is created by embedding a watermark (logo) into the statistical synthetic image by using a visible watermarking technique. This compound watermark is invisibly embedded into the important block of the host image. The authentication process involves extraction of the perceptive logo as well statistical testing for two-layer evidence. Results of the experimentation using standard benchmarks demonstrates the robustness and efficacy of the proposed watermarking approach. Ownership proof could be established under various hostile attacks.