Digital watermarking based on neural networks for color images
Signal Processing - Special section on digital signal processing for multimedia communications and services
Principles of Neurocomputing for Science and Engineering
Principles of Neurocomputing for Science and Engineering
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
CW '02 Proceedings of the First International Symposium on Cyber Worlds (CW'02)
A Novel DCT-based Approach for Secure Color Image Watermarking
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Adaptive watermark mechanism for rightful ownership protection
Journal of Systems and Software
A robust DCT-based watermarking for copyright protection
IEEE Transactions on Consumer Electronics
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Multipurpose image watermarking algorithm based on multistage vector quantization
IEEE Transactions on Image Processing
Fuzzy-ART based adaptive digital watermarking scheme
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 12.05 |
Watermarking is a technique used for digital copyright protection. It has been developed to protect digital media from being illegally reproduced and modified. In this paper, a full counter-propagation neural network (FCNN) is applied to copyright authentication, where the ownership information (watermark) is embedded and detected by a specific FCNN. As opposed to traditional methods, the watermark is stored in the synapses of the FCNN. Because an FCNN has storage and fault tolerance, most attacks do not degrade the quality of the detected watermark image. Moreover, the watermark embedding procedure and detection procedure are integrated into the proposed FCNN. It accomplishes watermark embedding and detection of one or many watermarks using a multi-cover image. The experimental results show that the proposed method is more robust than Deng's, Hsieh's, Hsu's, and Zhang's methods under different attacks, and that it is imperceptible and authentic.