IBM Systems Journal
A robust blind watermarking scheme based on distributed source coding principles
MULTIMEDIA '00 Proceedings of the eighth ACM international conference on Multimedia
On Resolving Rightful Ownership's of Digital Images by Invisible Watermarks
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Digital Watermarking using Inter-Block Correlation: Extension to JPEG Coded Domain
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
A Spatial Digital Video Watermark that Survives MPEG
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
An information-theoretic approach to the design of robust digital watermarking systems
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 04
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Optimal differential energy watermarking of DCT encoded images and video
IEEE Transactions on Image Processing
Blind watermarking technique based on integer discrete cosine transform and AC prediction
ICAI'07 Proceedings of the 8th Conference on 8th WSEAS International Conference on Automation and Information - Volume 8
An improvement of robust and blind data hiding based on self reference in spatial domain
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
Decision-Based Hybrid Image Watermarking in Wavelet Domain Using HVS and Neural Networks
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III
A novel robust watermarking technique using IntDCT based AC prediction
WSEAS Transactions on Computers
A real-time video watermarking system with buffer sharing for video-on-demand service
Computers and Electrical Engineering
Robust Watermarking Scheme Applied to Radiological Medical Images
IEICE - Transactions on Information and Systems
Wavelet-based copyright-protection scheme for digital images based on local features
Information Sciences: an International Journal
A robust watermarking scheme using self-reference image
Computer Standards & Interfaces
Real-time color image watermarking based on D-SVD scheme
PSIVT'07 Proceedings of the 2nd Pacific Rim conference on Advances in image and video technology
Prediction-based watermarking schemes using ahead/post AC prediction
Signal Processing
Nonblind and quasiblind natural preserve transform watermarking
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking
International Journal of Information Security and Privacy
Using PSO in a spatial domain based image hiding scheme with distortion tolerance
Computers and Electrical Engineering
Biometric template protection with DCT-based watermarking
Machine Vision and Applications
Hi-index | 0.10 |
For most watermark applications, it is often desired to retrieve the embedded information without access to the host data, which is a so-called blind watermarking technique. Most of the available blind watermarking schemes either suffer significantly from host data interference or require expense of storage. Therefore, a simple and effective blind watermarking scheme is expected. In this paper, we present a kind of blind watermarking technique, which is based on relative modulation of the pixel value/DCT coefficient value by referring to its estimated one. This technique entirely eliminates the effect of host data interference, thus having considerable advantage over previous counterpart watermarking schemes. Especially, our DCT AC-estimation-based technique reveals extraordinary robustness against numerical attacks, such as noise addition, filtering and JPEG compression.