Elements of information theory
Elements of information theory
Markov random field modeling in computer vision
Markov random field modeling in computer vision
Fast Robust Template Matching for Affine Resistant Image Watermarks
IH '99 Proceedings of the Third International Workshop on Information Hiding
Template Based Recovery of Fourier-Based Watermarks Using Log-polar and Log-log Maps
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding
IEEE Transactions on Signal Processing
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A new decoder for the optimum recovery of nonadditive watermarks
IEEE Transactions on Image Processing
Rotation, scale, and translation resilient watermarking for images
IEEE Transactions on Image Processing
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
Applying informed coding and embedding to design a robust high-capacity watermark
IEEE Transactions on Image Processing
Stochastic image warping for improved watermark desynchronization
European Journal of Information Systems
Robust Watermarking in DoG Scale Space Using a Multi-scale JND Model
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Asymptotically optimum universal watermark embedding and detection in the high-SNR regime
IEEE Transactions on Information Theory
Histogram-based image hashing for searching content-preserving copies
Transactions on data hiding and multimedia security VI
Hi-index | 0.06 |
Geometric transformations whereby the watermark embedder and detector are de-synchronized are known to be one of the most serious threats against any digital watermarking scheme, noticeably against those operating on still images. Despite their importance, only a few classes of geometric attacks are considered in the literature, including global geometric transformations and the random bending attack first introduced by the popular Stirmark software. In this paper we introduce two new classes of de-synchronization attacks (DAs), that extend the class of local geometric attacks so to allow for more powerful and less intrusive attacks. The effectiveness of the new classes of DAs is evaluated from different perspectives including: perceptual intrusiveness and de-synchronization efficacy. This work can be seen as a first step towards the characterization of the whole class of perceptually admissible DAs, which in turn is an essential step towards the development of a new class of watermarking systems that can effectively cope with them.