Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Digital Watermarking For Digital Media
Digital Watermarking For Digital Media
A Novel Blind Watermarking Algorithm in Contourlet Domain
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03
DigitalWatermarking in Contourlet Domain
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03
Blind Watermarking in Contourlet Domain with Improved Detection
IIH-MSP '06 Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Optimal detector for multiplicative watermarks embedded in the DFT domain of non-white signals
EURASIP Journal on Applied Signal Processing
Adaptive Image Watermarking Algorithm in Contourlet Domain
FCST '07 Proceedings of the 2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology
IEEE Transactions on Multimedia
Robust optimum detection of transform domain multiplicative watermarks
IEEE Transactions on Signal Processing
Optimum decoding and detection of multiplicative watermarks
IEEE Transactions on Signal Processing
A new class of two-channel biorthogonal filter banks and waveletbases
IEEE Transactions on Signal Processing
IEEE Transactions on Signal Processing
Toward robust logo watermarking using multiresolution image fusion principles
IEEE Transactions on Multimedia
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Adaptive wavelet thresholding for image denoising and compression
IEEE Transactions on Image Processing
A new decoder for the optimum recovery of nonadditive watermarks
IEEE Transactions on Image Processing
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Robust image-adaptive data hiding using erasure and error correction
IEEE Transactions on Image Processing
Sparse geometric image representations with bandelets
IEEE Transactions on Image Processing
Ergodic chaotic parameter modulation with application to digital image watermarking
IEEE Transactions on Image Processing
The contourlet transform: an efficient directional multiresolution image representation
IEEE Transactions on Image Processing
Directional multiscale modeling of images using the contourlet transform
IEEE Transactions on Image Processing
The Nonsubsampled Contourlet Transform: Theory, Design, and Applications
IEEE Transactions on Image Processing
Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition
IEEE Transactions on Image Processing
Distribution independent blind watermarking
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
A high capacity and strong robust fingerprinting for compressed images
Computers and Electrical Engineering
Engineering Applications of Artificial Intelligence
Hi-index | 0.01 |
In this paper, an improved multiplicative image watermarking system is presented. Since human visual system is less sensitive to the image edges, watermarking is applied in the contourlet domain, which represents image edges sparsely. In the presented scheme, watermark data is embedded in directional subband with the highest energy. By modeling the contourlet coefficients with General Gaussian Distribution (GGD), the distribution of watermarked noisy coefficients is analytically calculated. The tradeoff between the transparency and robustness of the watermark data is solved in a novel fashion. At the receiver, based on the Maximum Likelihood (ML) decision rule, an optimal detector by the aid of channel side information is proposed. In the next step, a blind extension of the suggested algorithm is presented using the patchwork idea. Experimental results confirm the superiority of the proposed method against common attacks, such as Additive White Gaussian Noise (AWGN), JPEG compression, and rotation attacks, in comparison with the recently proposed techniques.