Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Feature Extraction and a Database Strategy for Video Fingerprinting
VISUAL '02 Proceedings of the 5th International Conference on Recent Advances in Visual Information Systems
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Color Image Watermarking and Self-recovery Based on Independent Component Analysis
ICAISC '08 Proceedings of the 9th international conference on Artificial Intelligence and Soft Computing
A novel watermarking scheme for JPEG images
WSEAS Transactions on Signal Processing
Performance analysis of Fridrich-Goljan self-embedding authentication method
IEEE Transactions on Information Forensics and Security
A hybrid content-based image authentication scheme
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Image distortion estimation by hash comparison
MMM'11 Proceedings of the 17th international conference on Advances in multimedia modeling - Volume Part I
NPT based video watermarking with non-overlapping block matching
Transactions on computational science XI
A secure perceptual hash algorithm for image content authentication
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Robust image content authentication using perceptual hashing and watermarking
PCM'12 Proceedings of the 13th Pacific-Rim conference on Advances in Multimedia Information Processing
Hi-index | 0.00 |
In this paper we describe an algorithm for robust extraction of bits from image blocks and a method for synthesizing a Gaussian pseudo-random sequence from those bits. The bits are extracted by thresholding projections onto random smooth patterns generated from a user-specified key. The extracted bits are further utilized to synthesize a Gaussian pseudo-random sequence that changes continuously with the image block yet depends sensitively on the secret key. The proposed technique is quite general and can be combined with majority of oblivious watermarking schemes that generate watermarks from pseudo-random sequences. We anticipate that this algorithm will find applications in many oblivious watermarking schemes including secure data embedding into videos and watermarking images for tamper detection.