Elements of information theory
Elements of information theory
Evaluation of Interest Point Detectors
International Journal of Computer Vision - Special issue on a special section on visual surveillance
Digital watermarking
Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
A Genetic Algorithm for the Multidimensional Knapsack Problem
Journal of Heuristics
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Secure hybrid robust watermarking resistant against tampering and copy attack
Signal Processing - Special section: Security of data hiding technologies
Scale & Affine Invariant Interest Point Detectors
International Journal of Computer Vision
Distinctive Image Features from Scale-Invariant Keypoints
International Journal of Computer Vision
A Comparison of Affine Region Detectors
International Journal of Computer Vision
Spread-spectrum watermarking security
IEEE Transactions on Information Forensics and Security
Meta-RaPS approach for the 0-1 Multidimensional Knapsack Problem
Computers and Industrial Engineering - Special issue: Selected papers from the 31st international conference on computers & industrial engineering
IEEE Transactions on Image Processing
Geometric distortion insensitive image watermarking in affine covariant regions
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Local histogram based geometric invariant image watermarking
Signal Processing
Measuring the coverage of interest point detectors
ICIAR'11 Proceedings of the 8th international conference on Image analysis and recognition - Volume Part I
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
A feature-based robust digital image watermarking scheme
IEEE Transactions on Signal Processing
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
Image watermarking based on invariant regions of scale-space representation
IEEE Transactions on Signal Processing
A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks
IEEE Transactions on Information Forensics and Security
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Theory
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Robust template matching for affine resistant image watermarks
IEEE Transactions on Image Processing
Rotation, scale, and translation resilient watermarking for images
IEEE Transactions on Image Processing
Digital watermarking robust to geometric distortions
IEEE Transactions on Image Processing
On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking
IEEE Transactions on Image Processing
Robust image watermarking based on generalized Radon transformations
IEEE Transactions on Circuits and Systems for Video Technology
IEEE Transactions on Circuits and Systems for Video Technology
Lossless Data Embedding Using Generalized Statistical Quantity Histogram
IEEE Transactions on Circuits and Systems for Video Technology
Efficient ant colony optimization for image feature selection
Signal Processing
Robust and secure watermarking scheme for breath sound
Journal of Systems and Software
Bayesian Segmentation Based Local Geometrically Invariant Image Watermarking
Fundamenta Informaticae
Hi-index | 0.08 |
Local image features have been widely applied in feature-based watermarking schemes. The feature invariance is exploited to achieve robustness against attacks, but the leakage of information about hidden watermarks from publicly known locations and sizes of features are often unconsidered in security. This paper, therefore, proposes a novel image watermarking approach, which adopts invariant feature regions to jointly enhance its robustness and security. Initially, circular feature regions are determined by the scale-adapted auto-correlation matrix and the Laplacian-of-Gaussian operation. Leakage of secret information is also controlled carefully during feature detection procedure. An optimal selection process formulated as a multidimensional knapsack problem is then proposed to select robust non-overlapping regions from those circular feature regions to resist various attacks. This process is implemented by a genetic algorithm-based approach, and incorporates randomization to mitigate the security risk. Finally, each selected region is normalized to obtain a geometrically invariant feature region, and embedded with a region-dependent watermark to overcome the weakness of multiple-redundant watermarks. The evaluation results based on the StirMark benchmark present the proposed scheme can tolerate various attacks, including noise-like signal processing and geometric distortions. A security analysis in terms of differential entropy also confirms the security improvement of the proposed method.