Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
A Wavelet-Based Image Watermarking Scheme
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
A new wavelet based logo-watermarking scheme
Pattern Recognition Letters
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
Blind watermarking technique based on integer discrete cosine transform and AC prediction
ICAI'07 Proceedings of the 8th Conference on 8th WSEAS International Conference on Automation and Information - Volume 8
A new approach to pre-processing digital image for wavelet-based watermark
Journal of Computational and Applied Mathematics
A novel robust watermarking technique using IntDCT based AC prediction
WSEAS Transactions on Computers
Robustness-set in watermarking embedding systems using codebook classifications
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
3D facial visualization through adaptive spread spectrum synchronous scalable (A4S) data hiding
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Hi-index | 7.29 |
In digital management, multimedia content and data can easily be used in an illegal way-being copied, modified and distributed again. Copyright protection, intellectual and material rights protection for authors, owners, buyers, distributors and the authenticity of content are crucial factors in solving an urgent and real problem. In such scenario digital watermark techniques are emerging as a valid solution. In this paper, we describe an algorithm-called WM2.0-for an invisible watermark: private, strong, wavelet-based and developed for digital images protection and authenticity. Using discrete wavelet transform (DWT) is motivated by good time-frequency features and well-matching with human visual system directives. These two combined elements are important in building an invisible and robust watermark. WM2.0 works on a dual scheme: watermark embedding and watermark detection. The watermark is embedded into high frequency DWT components of a specific sub-image and it is calculated in correlation with the image features and statistic properties. Watermark detection applies a re-synchronization between the original and watermarked image. The correlation between the watermarked DWT coefficients and the watermark signal is calculated according to the Neyman-Pearson statistic criterion. Experimentation on a large set of different images has shown to be resistant against geometric, filtering and StirMark attacks with a low rate of false alarm.