A simple unpredictable pseudo random number generator
SIAM Journal on Computing
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Lossless data embedding--new paradigm in digital watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Adaptive watermark mechanism for rightful ownership protection
Journal of Systems and Software
A neural network based lossless digital image watermarking in the spatial domain
ISNN'05 Proceedings of the Second international conference on Advances in neural networks - Volume Part II
Lossless watermarking for image authentication: a new framework and an implementation
IEEE Transactions on Image Processing
A new SVM-based image watermarking using Gaussian-Hermite moments
Applied Soft Computing
Intelligent reversible watermarking in integer wavelet domain for medical images
Journal of Systems and Software
Performance evaluation of moment-based watermarking methods: A review
Journal of Systems and Software
An SVD-based image watermarking in wavelet domain using SVR and PSO
Applied Soft Computing
Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras
Information Sciences: an International Journal
Journal of Systems and Software
Journal of Systems and Software
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
This paper presents a robust lossless watermarking technique, based on @a-trimmed mean algorithm and support vector machine (SVM), for image authentication. SVM is trained to memorize relationship between the watermark and the image-dependent watermark other than embedding watermark into the host image. While needing to authenticate the ownership of the image, the trained SVM is used to recover the watermark and then the recovered watermark is compared with the original watermark to determine the ownership. Meanwhile, the robustness can be enhanced using @a-trimmed mean operator against attacks. Experimental results demonstrate that the technique not only possesses the robustness to resist on image-manipulation attacks under consideration but also, in average, is superior to other existing methods being considered in the paper.