IBM Systems Journal
A DCT-domain system for robust image watermarking
Signal Processing
A dual watermarking technique for images
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 2)
Cocktail Watermarking on Images
IH '99 Proceedings of the Third International Workshop on Information Hiding
A hybrid watermarking technique applied to digital images
Applied Soft Computing
An interpolation-based watermarking scheme
Signal Processing
International Journal of Advanced Media and Communication
A feature-based robust digital image watermarking against geometric attacks
Image and Vision Computing
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A novel watermarking scheme for JPEG images
WSEAS Transactions on Signal Processing
A semi-blind digital watermarking scheme based on singular value decomposition
Computer Standards & Interfaces
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Optimal differential energy watermarking of DCT encoded images and video
IEEE Transactions on Image Processing
Dual domain watermarking for authentication and compression of cultural heritage images
IEEE Transactions on Image Processing
Hi-index | 0.00 |
In digital image watermarking, an image is embedded into a picture for a variety of purposes such as captioning and copyright protection. In this paper, a robust private watermarking scheme for embedding a gray-scale watermark is proposed. In the proposed method, the watermark and original image are processed by applying blockwise DCT. Also, a Dynamic Fuzzy Inference System (DFIS) is used to identify the best place for watermark insertion by approximating the relationship established between the properties of HVS model. In the insertion phase, the DC coefficients of the original image are modified according to DC value of watermark and output of Fuzzy System. In the experiment phase, the CheckMark (StirMark MATLAB) software was used to verify the method robustness by applying several conventional attacks on the watermarked image. The results showed that the proposed scheme provided high image quality while it was robust against various attacks, such as Compression, Filtering, additive Noise, Cropping, Scaling, Changing aspect ratio, Copy attack, and Composite attack in comparison with related methods.