Algebraic feature extraction of image for recognition
Pattern Recognition
IBM Systems Journal
Robust image watermarking in the spatial domain
Signal Processing
Pattern Recognition Letters
A new wavelet based logo-watermarking scheme
Pattern Recognition Letters
A semi-blind digital watermarking scheme based on singular value decomposition
Computer Standards & Interfaces
SVD-based digital image watermarking scheme
Pattern Recognition Letters
An SVD-based watermarking scheme for protecting rightful ownership
IEEE Transactions on Multimedia
DCT-based image watermarking using subsampling
IEEE Transactions on Multimedia
IEEE Transactions on Multimedia
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Optimal differential energy watermarking of DCT encoded images and video
IEEE Transactions on Image Processing
Rotation, scale, and translation resilient watermarking for images
IEEE Transactions on Image Processing
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
Wavelet tree quantization for copyright protection watermarking
IEEE Transactions on Image Processing
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
A new digital image watermarking scheme based on Schur decomposition
Multimedia Tools and Applications
Robust copyright protection scheme for digital images using overlapping DCT and SVD
Applied Soft Computing
Hi-index | 0.01 |
In this paper, a novel copyright protection scheme that combines the discrete wavelet transform (DWT) and the singular value decomposition (SVD) is proposed. Instead of modifying the original host image to conceal a secret image, the proposed scheme first extracts the image features from the host image by applying the DWT and the SVD. The extracted features are then classified into two clusters by employing the k-means clustering technique, and a master share is generated using the clustering result. Finally, the master share is used together with a secret image to construct an ownership share according to a two-out-of-two visual cryptography (VC) technique. When rightful ownership needs to be determined, the secret image for ownership identification can be revealed by stacking the master share and the ownership share. Experimental results demonstrate that the proposed scheme can effectively resist several common attacks. In addition, the revealed watermark can be easily recognized by human eyes, even if the host image has undergone severe attacks.