DCT and DWT-Based Image Watermarking by Using Subsampling
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
The secret-open watermarking scheme for ownership verification
International Journal of Computer Applications in Technology
The secret-open watermarking scheme for ownership verification
International Journal of Computer Applications in Technology
Subjective and Objective Watermark Detection Using a Novel Approach --- Barcode Watermarking
Computational Intelligence and Security
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Controversy Corner: A robust DWT-based copyright verification scheme with Fuzzy ART
Journal of Systems and Software
A robust watermarking scheme using self-reference image
Computer Standards & Interfaces
Spatial frequency band division in human visual system based-watermarking
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Real-time color image watermarking based on D-SVD scheme
PSIVT'07 Proceedings of the 2nd Pacific Rim conference on Advances in image and video technology
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Semi-fragile Zernike moment-based image water marking for authentication
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Multimedia Tools and Applications
Multiple image watermarking using the SILE approach
MUSP'06 Proceedings of the 6th WSEAS international conference on Multimedia systems & signal processing
Digital watermarking for multimedia protection
ICAI'05/MCBC'05/AMTA'05/MCBE'05 Proceedings of the 6th WSEAS international conference on Automation & information, and 6th WSEAS international conference on mathematics and computers in biology and chemistry, and 6th WSEAS international conference on acoustics and music: theory and applications, and 6th WSEAS international conference on Mathematics and computers in business and economics
A Robust Watermarking Scheme Using Sequency-ordered Complex Hadamard Transform
Journal of Signal Processing Systems
Multi-band wavelet based digital watermarking using principal component analysis
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A new watermarking method based on DWT
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Revaluation of error correcting coding in watermarking channel
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A watermarking algorithm for JPEG file
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Analysis of quantization-based audio watermarking in DA/AD conversions
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Performance analysis of CDMA-Based watermarking with quantization scheme
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A novel approach to digital watermarking, exploiting colour spaces
Signal Processing
Hi-index | 0.43 |
A new watermarking scheme which incorporates wavelet and spatial transformation has been developed for digital images. This algorithm utilizes the wavelet multiresolutional structure to construct the image frequency components and the chaotic transformation as two dimensional integer vector generators for spatial transform to select the location during the watermark embedding. To efficiently embed the watermark within the image without the loss of image quality and provide the robustness for the watermark detection under attacks, a modular based spatial threshold and adjustment scheme of the wavelet coefficients has been developed in this research. Unlike other watermarking schemes which usually rely on significantly large amount of side information for watermark detection, our algorithm need only few key parameters to detect the watermark with meaningful content. Compared with some known approaches of watermarking schemes, this algorithm results in superior robustness and information protection for keeping watermark intact under image processing attacks like image compression