Histogram Preserving Image Transformations
International Journal of Computer Vision
Object Recognition from Local Scale-Invariant Features
ICCV '99 Proceedings of the International Conference on Computer Vision-Volume 2 - Volume 2
Watermarking in secure image retrieval
Pattern Recognition Letters
Scale & Affine Invariant Interest Point Detectors
International Journal of Computer Vision
A Multibit Geometrically Robust Image Watermark Based on Zernike Moments
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
Learning a Maximum Margin Subspace for Image Retrieval
IEEE Transactions on Knowledge and Data Engineering
A leak and its remedy in JPEG image encryption
International Journal of Computer Mathematics - Computer Vision and Pattern Recognition
A local Tchebichef moments-based robust image watermarking
Signal Processing
Reversibility improved lossless data hiding
Signal Processing
Geometric distortion insensitive image watermarking in affine covariant regions
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Visual information encryption in frequency domain: risk and enhancement
IWICPAS'06 Proceedings of the 2006 Advances in Machine Vision, Image Processing, and Pattern Analysis international conference on Intelligent Computing in Pattern Analysis/Synthesis
A feature-based robust digital image watermarking scheme
IEEE Transactions on Signal Processing
Image watermarking based on invariant regions of scale-space representation
IEEE Transactions on Signal Processing
Geometric Invariance in image watermarking
IEEE Transactions on Image Processing
Learning a semantic space from user's relevance feedback for image retrieval
IEEE Transactions on Circuits and Systems for Video Technology
Invariant image watermark using Zernike moments
IEEE Transactions on Circuits and Systems for Video Technology
Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain
IEEE Transactions on Circuits and Systems for Video Technology
Content-adaptive reliable robust lossless data embedding
Neurocomputing
Lossless data hiding for VQ indices based on neighboring correlation
Information Sciences: an International Journal
A robust blind color image watermarking in quaternion Fourier transform domain
Journal of Systems and Software
Image encryption process based on chaotic synchronization phenomena
Signal Processing
Block-based progressive visual secret sharing
Information Sciences: an International Journal
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Information Sciences: an International Journal
Hi-index | 0.08 |
Compared with other existing methods, the feature point-based image watermarking schemes can resist to global geometric attacks and local geometric attacks, especially cropping and random bending attacks (RBAs), by binding watermark synchronization with salient image characteristics. However, the watermark detection rate remains low in the current feature point-based watermarking schemes. The main reason is that both of feature point extraction and watermark embedding are more or less related to the pixel position, which is seriously distorted by the interpolation error and the shift problem during geometric attacks. In view of these facts, this paper proposes a geometrically robust image watermarking scheme based on local histogram. Our scheme mainly consists of three components: (1) feature points extraction and local circular regions (LCRs) construction are conducted by using Harris-Laplace detector; (2) a mechanism of grapy theoretical clustering-based feature selection is used to choose a set of non-overlapped LCRs, then geometrically invariant LCRs are completely formed through dominant orientation normalization; and (3) the histogram and mean statistically independent of the pixel position are calculated over the selected LCRs and utilized to embed watermarks. Experimental results demonstrate that the proposed scheme can provide sufficient robustness against geometric attacks as well as common image processing operations.