Journal of Cognitive Neuroscience
Attacking visible watermarking schemes
IEEE Transactions on Multimedia
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
Hi-index | 0.00 |
In this paper, we propose a novel invisible watermarking method with image signature, which can resist not only common image attacks but also copy attack. The image signature algorithm referred is based on Image Independent Block Feature (IIBF) obtained by Independent Component Analysis (ICA). Simulations demonstrate the robustness of this method. In addition, this invisible watermarking method can be applied to protect the visible-watermarked image. That is to say, we can claim the ownership of the image after visible watermark removal by the invisible watermark.