Robust digital image watermarking method against geometrical attacks
Real-Time Imaging
A copyright protection scheme for digital images using visual cryptography technique
Computer Standards & Interfaces
An image rectification scheme and its applications in RST invariant digital image watermarking
Multimedia Tools and Applications
Watermarking Polygonal Lines Using Fourier Descriptors
IEEE Computer Graphics and Applications
Optimization approach for 3D model watermarking by linear binary programming
Computer Aided Geometric Design
Robust lossless image watermarking based on α-trimmed mean algorithm and support vector machine
Journal of Systems and Software
The RST invariant digital image watermarking using Radon transforms and complex moments
Digital Signal Processing
An intelligent watermarking method based on particle swarm optimization
Expert Systems with Applications: An International Journal
Geometrically invariant image watermarking using SVR correction in NSCT domain
Computers and Electrical Engineering
A feature-based robust digital image watermarking scheme
IEEE Transactions on Signal Processing
Robust template matching for affine resistant image watermarks
IEEE Transactions on Image Processing
Geometrically invariant watermarking using feature points
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This paper proposes a zero-watermark scheme with geometrical invariants using support vector machine (SVM) classifier against geometrical attacks for image authentication. Here geometrical attacks merely address rotation, scale, and translation (RST) operations on images. The proposed scheme is called the SVM-based zero-watermark (SZW) scheme hereafter. The SZW method makes no changes to original images while embedding the owner signature of images so as to achieve high transparency. Moreover, in order to promote the robustness to RST operations, it integrates the discrete Fourier transform (DFT) with the log-polar mapping (LPM) for finding out RST invariants of images. The SZW method then generates the secret key for a host image via performing a logical operation exclusive disjunction, an exclusive-or (XOR) operation, on the original watermark and a set of the characteristics of the RST invariants of the host image. Subsequently, a trained SVM (TSVM) is regarded as a mapping so that it can memorize the relationships between the set of characteristics of RST invariants and the secret key. During the watermark-extraction process of the SZW method, the TSVM is first fed with the set of characteristics of RST invariants of the watermarked image to get the estimated secret key. The SZW method then extracts the estimated watermark by performing the XOR operation on the set of characteristics of RST invariants and the estimated secret key. Consequently, the SZW method requires no original image while retrieving watermarks. In the paper, the particle swarm optimization (PSO) algorithm is also employed to search for a set of nearly optimal parameters of the SVM. Finally, the experimental results show that, in average, the SZW method outperforms other existing methods against RST attacks under consideration here.