Digital watermarking
Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
DCT-based watermark recovering without resorting to the uncorrupted original image
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Robust digital image watermarking method against geometrical attacks
Real-Time Imaging
Introducing a watermarking with a multi-objective genetic algorithm
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Digital Image Processing (3rd Edition)
Digital Image Processing (3rd Edition)
An evaluation of image based steganography methods
Multimedia Tools and Applications
A steganographic method based upon JPEG and particle swarm optimization algorithm
Information Sciences: an International Journal
A new scheme of robust image watermarking: the double watermarking algorithm
Proceedings of the 2007 Summer Computer Simulation Conference
Self-synchronizing robust texel watermarking in gaussian scale-space
Proceedings of the 10th ACM workshop on Multimedia and security
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Digital Image Processing Using MATLAB: AND " Mathworks, MATLAB Sim SV 07 "
Digital Image Processing Using MATLAB: AND " Mathworks, MATLAB Sim SV 07 "
Digital Watermarking and Steganography
Digital Watermarking and Steganography
High payload steganography mechanism using hybrid edge detector
Expert Systems with Applications: An International Journal
A novel adaptive steganography based on local complexity and human vision sensitivity
Journal of Systems and Software
A RST-Invariant robust DWT-HMM watermarking algorithm incorporating zernike moments and template
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Additive vs. image dependent DWT-DCT based watermarking
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Joint wavelet and spatial transformation for digital watermarking
IEEE Transactions on Consumer Electronics
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Optimal differential energy watermarking of DCT encoded images and video
IEEE Transactions on Image Processing
Applying informed coding and embedding to design a robust high-capacity watermark
IEEE Transactions on Image Processing
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
A method for watermark casting on digital image
IEEE Transactions on Circuits and Systems for Video Technology
Data hiding in scrambled images: A new double layer security data hiding technique
Computers and Electrical Engineering
Hi-index | 0.08 |
Watermarking is the process of embedding information in a carrier in order to protect the ownership of text, music, video and images, while steganography is the art of hiding information. Normally watermarks are embedded in images but remain visible in the majority of commercial image databases, such as Getty (gettyimages.ie) or iStock Photo (istockphoto.com). However this leaves traditional watermarking techniques vulnerable to tampering. Thus the advantage of using steganographic techniques for watermarking is that the watermark is resistant to detection and consequently to tampering. Robustness is a characteristic of critical importance, in order that a watermark is to survive image manipulation and enhancement processes, as well as intentional attacks, to ensure piracy is prevented. The aim of this work is to produce a novel hybrid digital watermarking technique, based on the exploitation of both the RGB and the YCbCr colour spaces, using spatial domain techniques. Results demonstrate that the proposed hybrid technique can withstand levels of geometric attacks and processing attacks up to a point where the commercial value of the images tested would be lost. Results also demonstrate technical and performance improvements over existing methods, in terms of security and algorithm efficiency, while taking inspiration from steganography, to avoid drawing attention to the fact that an image contains hidden information.