Three-dimensional computer vision: a geometric viewpoint
Three-dimensional computer vision: a geometric viewpoint
Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Fast Robust Template Matching for Affine Resistant Image Watermarks
IH '99 Proceedings of the Third International Workshop on Information Hiding
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Template Based Recovery of Fourier-Based Watermarks Using Log-polar and Log-log Maps
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Some general methods for tampering with watermarks
IEEE Journal on Selected Areas in Communications
A new decoder for the optimum recovery of nonadditive watermarks
IEEE Transactions on Image Processing
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
On the Limits of Second Generation Watermarks
CRV '04 Proceedings of the 1st Canadian Conference on Computer and Robot Vision
A robust watermarking system based on SVD compression
Proceedings of the 2006 ACM symposium on Applied computing
Embedding color watermarks in color images
EURASIP Journal on Applied Signal Processing
Time-frequency signal synthesis and its application in multimedia watermark detection
EURASIP Journal on Applied Signal Processing
Histogram-based image hashing scheme robust against geometric deformations
Proceedings of the 9th workshop on Multimedia & security
Watermarking Based on the Density Coefficients of Faber-Schauder Wavelets
ICISP '08 Proceedings of the 3rd international conference on Image and Signal Processing
GA-Based Robustness Evaluation Method for Digital Image Watermarking
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Hardware assisted watermarking for multimedia
Computers and Electrical Engineering
Video Watermarking and Benchmarking
Proceedings of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies
A robust spread spectrum watermarking method using two levels DCT
International Journal of Electronic Security and Digital Forensics
How to Compare Image Watermarking Algorithms
Transactions on Data Hiding and Multimedia Security IV
Watermarking robustness evaluation based on perceptual quality via genetic algorithms
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Image Processing
A new spread spectrum watermarking method using two levels DCT
International Journal of Electronic Security and Digital Forensics
Edge adaptive image steganography based on LSB matching revisited
IEEE Transactions on Information Forensics and Security
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
Information Sciences: an International Journal
Statistical analysis of image quality metrics for watermark transparency assessment
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
EURASIP Journal on Advances in Signal Processing - Special issue on time-frequency analysis and its applications to multimedia signals
A more secure steganography based on adaptive pixel-value differencing scheme
Multimedia Tools and Applications
Robust image hash in Radon transform domain for authentication
Image Communication
Personal rights management – taming camera-phones for individual privacy enforcement
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
A two-step watermarking attack using long-range correlation image restoration
Security and Communication Networks
Effective Management of Medical Information Through A Novel Blind Watermarking Technique
Journal of Medical Systems
Securing high resolution grayscale facial captures using a blockwise coevolutionary GA
Expert Systems with Applications: An International Journal
Visual cryptography based watermarking: definition and meaning
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
CamMark: a camcorder copy simulation as watermarking benchmark for digital video
Proceedings of the 5th ACM Multimedia Systems Conference
Perceptual watermarking using a new Just-Noticeable-Difference model
Image Communication
Rapid blockwise multi-resolution clustering of facial images for intelligent watermarking
Machine Vision and Applications
Hi-index | 0.01 |
Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms perform well against the now standard benchmark tests included in the Stirmark package. However the stirmark tests are limited since in general they do not properly model the watermarking process and consequently are limited in their potential to removing the best watermarks. Here we propose a second generation benchmark for image watermarking which includes attacks which take into account powerful prior information about the watermark and the watermarking algorithms. We follow the model of the Stirmark benchmark and propose several new categories of tests including: denoising (ML and MAP), wavelet compression, watermark copy attack, active desynchronization, denoising, geometrical attacks, and denoising followed by perceptual remodulation. In addition, we take the important step of presenting results as a function of application. This is an important contribution since it is unlikely that one technology will be suitable for all applications.