The nature of statistical learning theory
The nature of statistical learning theory
A survey of RST invariant image watermarking algorithms
ACM Computing Surveys (CSUR)
An image rectification scheme and its applications in RST invariant digital image watermarking
Multimedia Tools and Applications
Properties of orthogonal Gaussian-Hermite moments and their applications
EURASIP Journal on Applied Signal Processing
Human visual system based adaptive digital image watermarking
Signal Processing
Color image watermarking scheme based on linear discriminant analysis
Computer Standards & Interfaces
Machine learning based adaptive watermark decoding in view of anticipated attack
Pattern Recognition
Feature based RDWT watermarking for multimodal biometric system
Image and Vision Computing
A robust image watermarking algorithm using SVR detection
Expert Systems with Applications: An International Journal
Robust Object-Based Watermarking Using Feature Matching
IEICE - Transactions on Information and Systems
A local Tchebichef moments-based robust image watermarking
Signal Processing
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01
Reversible data hiding based on histogram modification of pixel differences
IEEE Transactions on Circuits and Systems for Video Technology
Watermarking robustness evaluation based on perceptual quality via genetic algorithms
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Image Processing
A new robust digital image watermarking based on Pseudo-Zernike moments
Multidimensional Systems and Signal Processing
Robust lossless image watermarking based on α-trimmed mean algorithm and support vector machine
Journal of Systems and Software
Rotation invariant watermark embedding based on scale-adapted characteristic regions
Information Sciences: an International Journal
Image watermarking method in multiwavelet domain based on support vector machines
Journal of Systems and Software
Geometric distortion insensitive image watermarking in affine covariant regions
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
The RST invariant digital image watermarking using Radon transforms and complex moments
Digital Signal Processing
Generic lossless visible watermarking: a new approach
IEEE Transactions on Image Processing
Image watermarking based on invariant regions of scale-space representation
IEEE Transactions on Signal Processing
A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks
IEEE Transactions on Information Forensics and Security
The Nonsubsampled Contourlet Transform: Theory, Design, and Applications
IEEE Transactions on Image Processing
Bayesian Segmentation Based Local Geometrically Invariant Image Watermarking
Fundamenta Informaticae
Hi-index | 0.00 |
Geometric attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work to design a robust image watermarking scheme against geometric attacks. Based on the support vector machine (SVM) and Gaussian-Hermite moments (GHMs), we propose a robust image watermarking algorithm in nonsubsampled contourlet transform (NSCT) domain with good visual quality and reasonable resistance toward geometric attacks in this paper. Firstly, the NSCT is performed on original host image, and corresponding low-pass subband is selected for embedding watermark. Then, the selected low-pass subband is divided into small blocks. Finally, the digital watermark is embedded into host image by modulating adaptively the NSCT coefficients in small block. The main steps of digital watermark detecting procedure include: (1) some low-order Gaussian-Hermite moments of training image are computed, which are regarded as the effective feature vectors; (2) the appropriate kernel function is selected for training, and a SVM training model can be obtained; (3) the watermarked image is corrected with the well trained SVM model; (4) the digital watermark is extracted from the corrected watermarked image. Experimental results show that the proposed image watermarking is not only invisible and robust against common image processing operations such as filtering, noise adding, JPEG compression, etc., but also robust against the geometric attacks.