Matching Widely Separated Views Based on Affine Invariant Regions
International Journal of Computer Vision
Scale & Affine Invariant Interest Point Detectors
International Journal of Computer Vision
Distinctive Image Features from Scale-Invariant Keypoints
International Journal of Computer Vision
A feature-based robust digital image watermarking scheme
IEEE Transactions on Signal Processing
Robust template matching for affine resistant image watermarks
IEEE Transactions on Image Processing
Rotation, scale, and translation resilient watermarking for images
IEEE Transactions on Image Processing
Region-based image watermarking
IEEE Transactions on Image Processing
Geometrically invariant watermarking using feature points
IEEE Transactions on Image Processing
Geometric Invariance in image watermarking
IEEE Transactions on Image Processing
Robust image watermarking based on generalized Radon transformations
IEEE Transactions on Circuits and Systems for Video Technology
A feature-based robust digital image watermarking against geometric attacks
Image and Vision Computing
Invariant image watermarking using multi-scale Harris detector and wavelet moments
Computers and Electrical Engineering
Robust image retrieval based on color histogram of local feature regions
Multimedia Tools and Applications
A robust content based image watermarking using local invariant histogram
Multimedia Tools and Applications
Image watermarking with feature point based synchronization robust to print-scan attack
Journal of Visual Communication and Image Representation
Hi-index | 0.01 |
This paper addresses feature extraction techniques for robust watermarking. Geometric distortion attacks desynchronize the location of the inserted watermark and hence prevent watermark detection. Watermark synchronization, which is a process of finding the location for watermark insertion and detection, is crucial to design robust watermarking. One solution is to use image features. This paper reviews feature extraction techniques that have been used in featurebased watermarking: the Harris corner detector and the Mexican Hat wavelet scale interaction method. We also evaluate the scale-invariant keypoint extractor in comparison with other techniques in aspect of watermarking. After feature extraction, the set of triangles is generated by Delaunay tessellation. These triangles are the location for watermark insertion and detection. Redetection ratio of triangles is evaluated against geometric distortion attacks as well as signal processing attacks. Experimental results show that the scale-invariant keypoint extractor is appropriate for robust watermarking.