Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Proceedings of the 2004 workshop on Multimedia and security
e-Forensics steganography system for secret information retrieval
Advanced Engineering Informatics
Tamper detection for ubiquitous RFID-Enabled supply chain
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Joint wavelet and spatial transformation for digital watermarking
IEEE Transactions on Consumer Electronics
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
Watermarking technique for wireless multimedia sensor networks: a state of the art
Proceedings of the CUBE International Information Technology Conference
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
Digital copyright protection has attracted a great spectrum of studies. One of the optimistic techniques is digital watermarking. Many digital watermarking algorithms were proposed in recent literature. One of the highly addressed issues within the watermarking literature is robustness against attacks. Considering this major issue, we propose a new robust image watermarking scheme. The proposed watermarking scheme achieves robustness by watermarking several images simultaneously. It firstly splits the watermark (which is a binary logo) into multiple pieces and then embeds each piece in a separate image, hence, this technique is termed 'Multiple Images Watermarking'. The binary logo is generated by extracting unique features from all the images which have to be watermarked. This watermark is first permuted and then embedded using SILE algorithm [7]. Permutation is important step to uniformly distribute the unique characteristics acquired from multiple logos. The proposed watermarking scheme is robust against a variety of attacks including Gamma Correction, JPEG, JPEG2000, Blur, Median, Histogram Equalization, Contrast, Salt and Pepper, Resize, Crop, Rotation 90, Rotation 180, Projective, Row Column Blanking and Row Column Copying and Counterfeit attack.