Rank-deficient and discrete ill-posed problems: numerical aspects of linear inversion
Rank-deficient and discrete ill-posed problems: numerical aspects of linear inversion
Digital watermarking
Curves and Surfaces for Computer-Aided Geometric Design: A Practical Code
Curves and Surfaces for Computer-Aided Geometric Design: A Practical Code
Bezier and B-Spline Techniques
Bezier and B-Spline Techniques
Bezier Curves as a Tool to Describe Kinetic Drawings
ICDAR '97 Proceedings of the 4th International Conference on Document Analysis and Recognition
A Shape-Preserving Data Embedding Algorithm for NURBS Curves and Surfaces
CGI '99 Proceedings of the International Conference on Computer Graphics
Watermarking 2D Vector Maps in the Mesh-Spectral Domain
SMI '03 Proceedings of the Shape Modeling International 2003
A Bezier Curve-Based Approach to Shape Description for Chinese Calligraphy Characters
ICDAR '01 Proceedings of the Sixth International Conference on Document Analysis and Recognition
Cubic Bézier approximation of a digitized curve
Pattern Recognition
The Generation of G1 Cubic Bézier Curve Fitting for Thai Consonant Contour
GMAI '07 Proceedings of the Geometric Modelling and Imaging
Watermarking algorithms for 3D NURBS graphic data
EURASIP Journal on Applied Signal Processing
Watermarking Polygonal Lines Using Fourier Descriptors
IEEE Computer Graphics and Applications
Sketch parameterization using curve approximation
GREC'05 Proceedings of the 6th international conference on Graphics Recognition: ten Years Review and Future Perspectives
Data hiding in curves with application to fingerprinting maps
IEEE Transactions on Signal Processing - Part II
Data hiding in binary image for authentication and annotation
IEEE Transactions on Multimedia
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving
IEEE Transactions on Multimedia
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Data hiding in image and video .I. Fundamental issues and solutions
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This paper presents a novel lossless data embedding algorithm for electronic inks. The proposed algorithm first computes the analytical ink-curve for each stroke as a set of smoothly concatenated cubic Bezier curves. During embedding, a set of data carrier points on the ink-curve are evaluated, perturbed, and then inserted into the original point array. Our proposed smooth inkcurve generation method iteratively refines the parameterization based on the local curve geometry. We demonstrate experimentally that the inserted points incur the least perceptional distortion on the marked ink-curves even after large mount of secret message is embedded. On extraction, the perturbed data carriers are identified and the original point array can be recovered. By subtracting these perturbed data carriers from their recomputed reference locations, we derive a sequence of perturbation vectors, from which the embedded secret message can be decoded. Based on the proposed embedding technique and the public-key cryptography, a hybrid secure ink authentication system is designed to secure electronic writings for tampering detection.