Progressive quantized projection watermarking scheme
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 1)
Digital watermarking
Practical Random Number Generation in Software
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
What Energy Functions Can Be Minimizedvia Graph Cuts?
IEEE Transactions on Pattern Analysis and Machine Intelligence
Recognition of Shapes by Editing Their Shock Graphs
IEEE Transactions on Pattern Analysis and Machine Intelligence
Feature based watermarking using watermark template match
Applied Mathematics and Computation
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Rotation, scale, and translation resilient watermarking for images
IEEE Transactions on Image Processing
Geometric Invariance in image watermarking
IEEE Transactions on Image Processing
Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition
IEEE Transactions on Image Processing
Second ACM international workshop on multimedia in forensics, security and intelligence (MiFor 2010)
Proceedings of the international conference on Multimedia
Hi-index | 0.00 |
Plain rotation, scaling, and/or translation of an image can lead to loss of watermark synchronization and thus authentication failure. The block based approaches in particular are sensitive to geometric distortions due to the need for repositioning the block's rectangular grid. In this paper, we propose a novel block based approach for watermarking image objects in a way that is invariant to RST distortions. With the term "image object" we refer to semantically contiguous parts of images that have a specific contour boundary. The proposed approach is based on shape information since the watermark is embedded in image blocks, the location and orientation of which is defined by Eulerian tours that are appropriately arranged in layers, around the object's skeleton. The skeleton of the object (MAT transform) is defined by the shape of its boundary and not only is invariant to RST transformations but is also robust to cropping, clipping and other common deformation attacks. Results on the Caltech database are reported, showing the advantages of the proposed scheme