Theory of algebraic invariants
Theory of algebraic invariants
Representations that uniquely characterize images modulo translation, rotation, and scaling
Pattern Recognition Letters
Fast Robust Template Matching for Affine Resistant Image Watermarks
IH '99 Proceedings of the Third International Workshop on Information Hiding
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
DCT-based watermark recovering without resorting to the uncorrupted original image
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Rotation, scale, and translation resilient watermarking for images
IEEE Transactions on Image Processing
Hi-index | 0.00 |
A watermarking scheme is presented in which the characteristics of both spatial and frequency techniques are combined to achieve robustness against image processing and geometric transformations. The proposed approach consists of three basic steps: estimation of the just noticeable image distortion, watermark embedding by adaptive spreading of the watermark signal in the frequency domain, and extraction of relevant information relating to the spatial distribution of pixels in the original image. The just noticeable image distortion is used to insert a pseudo-random signal such that its amplitude is maintained below the distortion sensitivity of the pixel into which it is embedded. Embedding the watermark in the frequency domain guarantees robustness against compression and other common image processing transformations. In the spatial domain most salient image points are characterized using the set of Hilbert first-order differential invariants. This information is used to detect geometrical attacks in a frequency-domain watermarked image and to resynchronize the attacked image. The presented schema has been evaluated experimentally. The obtained results show that the technique is resilient to most common attacks including rotation, translation, and scaling.