Scale-Space Theory in Computer Vision
Scale-Space Theory in Computer Vision
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Fast Robust Template Matching for Affine Resistant Image Watermarks
IH '99 Proceedings of the Third International Workshop on Information Hiding
Distinctive Image Features from Scale-Invariant Keypoints
International Journal of Computer Vision
Expanding the class of watermark de-synchronization attacks
Proceedings of the 9th workshop on Multimedia & security
Perceptual Watermarking Using Pyramidal JND Maps
ISM '08 Proceedings of the 2008 Tenth IEEE International Symposium on Multimedia
Geometrically invariant watermarking using feature points
IEEE Transactions on Image Processing
Digital watermarking robust to geometric distortions
IEEE Transactions on Image Processing
A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile
IEEE Transactions on Circuits and Systems for Video Technology
A new spatio-temporal JND model based on 3D pyramid decomposition
PCM'10 Proceedings of the Advances in multimedia information processing, and 11th Pacific Rim conference on Multimedia: Part II
Improved content-based watermarking using scale-invariant feature points
ICIAP'11 Proceedings of the 16th international conference on Image analysis and processing: Part I
Hi-index | 0.00 |
In this paper, a novel watermarking method in the Difference of Gaussian (DoG) Scale Space is proposed. The idea is to decompose image into DoG scales and insert the watermark into these DoG sub-images using a multiscale JND (Just Noticeable Difference) model, providing an invisible and robust watermarking scheme. In order to survive de-synchronization attacks, we use the SIFT (Scale Invariant Feature Tranform) keypoints detection. Both keypoints detection and JND mask are performed in the DoG scale space, reducing then the complexity of the method. An intensive experimental evaluation is carried out to demonstrate that the proposed technique is transparent and robust to a wide variety of attacks from "signal processing" to de-synchronization type, especially severe attacks like Print-Scan and Camcorder.