Reconstruction filters in computer-graphics
SIGGRAPH '88 Proceedings of the 15th annual conference on Computer graphics and interactive techniques
Fast Correlation Attacks: An Algorithmic Point of View
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Distinctive Image Features from Scale-Invariant Keypoints
International Journal of Computer Vision
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
A counter-geometric distortions data hiding scheme using double channels in color images
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
IEEE Transactions on Image Processing
Robust template matching for affine resistant image watermarks
IEEE Transactions on Image Processing
Rotation, scale, and translation resilient watermarking for images
IEEE Transactions on Image Processing
Geometrically invariant watermarking using feature points
IEEE Transactions on Image Processing
Digital watermarking robust to geometric distortions
IEEE Transactions on Image Processing
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This paper proposes a data hiding scheme composed of a synchronization technique by using content of the image and a DCT payload embedding method. The position of the center of gravity of each Delaunay triangle is embedded inside the red channel of the corresponding triangle. This information called synchronization information is afterward decoded robustly by fast correlation attacks used commonly in cryptanalysis. The synchronization information is used to recover the affine transform that has been done on the image. The best merit of correlation attack is its powerful error-correcting ability which can be used not only to get rid of false position information caused by a few missed or imagined features, but also to obtain enough error-free synchronization information in spite of the feature points undergoing geometry transformations. A DCT-based algorithm is used to embed secret messages in the blue channel of the image. The paper also explicitly analyses the channel noise model so as to provide a basis on which some important parameters used in fast correlation attacks are designed. Simulation results show that our data-hiding scheme is highly robust to geometrical distortions including RST and most of affine transformations, and common signal processing such as JPEG compression.