Watermarking of uncompressed and compressed video
Signal Processing
Digital watermarking
Second Generation Benchmarking and Application Oriented Evaluation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Embedding invisible information in color images
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Cocktail watermarking for digital image protection
IEEE Transactions on Multimedia
IEEE Transactions on Information Theory
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A method for watermark casting on digital image
IEEE Transactions on Circuits and Systems for Video Technology
Color PCA eigenimages and their application to compression and watermarking
Image and Vision Computing
Automatic image segmentation by dynamic region growth and multiresolution merging
IEEE Transactions on Image Processing
A perceptually tuned watermarking scheme for color images
IEEE Transactions on Image Processing
A visual model for estimating the perceptual redundancy inherent in color images
PCM'04 Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing - Volume Part II
Hi-index | 0.00 |
Robust watermarking with oblivious detection is essential to practical copyright protection of digital images. Effective exploitation of the characteristics of human visual perception to color stimuli helps to develop the watermarking scheme that fills the requirement. In this paper, an oblivious watermarking scheme that embeds color watermarks in color images is proposed. Through color gamut analysis and quantizer design, color watermarks are embedded by modifying quantization indices of color pixels without resulting in perceivable distortion. Only a small amount of information including the specification of color gamut, quantizer step-size, and color tables is required to extract the watermark. Experimental results show that the proposed watermarking scheme is computationally simple and quite robust in face of various attacks such as cropping, low-pass filtering, white-noise addition, scaling, and JPEG compression with high compression ratios.