IBM Systems Journal
Digital watermarking
Digital Image Processing
DCT-based watermark recovering without resorting to the uncorrupted original image
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Copyright protection of images using robust digital signatures
ICASSP '96 Proceedings of the Acoustics, Speech, and Signal Processing, 1996. on Conference Proceedings., 1996 IEEE International Conference - Volume 04
Applications of the naturalness preserving transform to image watermarking and data hiding
Digital Signal Processing
Cocktail watermarking for digital image protection
IEEE Transactions on Multimedia
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Multipurpose watermarking for image authentication and protection
IEEE Transactions on Image Processing
Geometrically invariant watermarking using feature points
IEEE Transactions on Image Processing
Geometric Invariance in image watermarking
IEEE Transactions on Image Processing
Wavelet tree quantization for copyright protection watermarking
IEEE Transactions on Image Processing
Tampering with a watermarking-based image authentication scheme
Pattern Recognition
Hi-index | 0.01 |
This paper presents a novel image watermark scheme based on the characteristics of amplitude attacks. First of all, the analysis of amplitude attacks is performed. Then the amplitude attacks are categorized into three types: positive attack, negative attack and random attack. Finally, based on these attack types, we design three corresponding detectors. The detectors remove the unreliable discrete cosine transform (DCT) coefficients in the attacked image so that only reliable coefficients are used for the extraction of the watermark embedded. The experimental results indicate that the proposed technique improves robustness significantly without sacrificing the false alarm rate.