A robust content-based digital image watermarking scheme
Tài liệu tham khảo
F. Peticolas, R. Anderson, M. Kuhn, Attacks on copyright marking systems, in: Proceedings of the Second Workshop Information Hiding, Portland, OR, April 1998, pp. 218–238.
S. Pereira, J.J.K. O’Ruanaidh, F. Deguillaume, G. Csurka, T. Pun, Template based recovery of Fourier-based watermarks using log-polar and log-log maps, in: Proceedings of the IEEE International Conference Multimedia Computing Systems, vol. 1, Florence, Italy, June 1999, pp. 870–874.
Pereira, 2000, Robust template matching for affine resistant image watermarks, IEEE Trans. Image Process., 9, 1123, 10.1109/83.846253
Digimarc Corporation, US patent 5,822,436, Photographic Products and Methods Employing Embedded Information.
J.J.K. O’Ruanaidh, T. Pun, Rotation, scale, and translation invariant digital image watermarking, in: Proceedings IEEE International Conference Image Processing, Santa Barbara, CA, 1997, pp. 536–539.
O’Ruanaidh, 1998, Rotation, scale, and translation invariant spread spectrum digital image watermarking, Signal Process., 66, 303, 10.1016/S0165-1684(98)00012-7
Zheng, 2003, RST-invariant digital image watermarking based on log-polar mapping and phase correlation, IEEE Trans. Circuits Syst. Video Technol., 13, 753, 10.1109/TCSVT.2003.815959
Lin, 2001, Rotation, scale, and translation resilient watermarking for images, IEEE Trans. Image Process., 10, 767, 10.1109/83.918569
M. Alghoniemy, A.H. Tewfik, Geometric distortion correction through image normalization, in: Proceedings of IEEE International Conference Multimedia Expo, vol. 3, 2000, pp. 1291–1294.
M. Alghoniemy, A.H. Tewfik, Image watermarking by moment invariants, in: Proceedings of IEEE International Conference Image Processing, vol. 2, Janual 2000, pp. 73–76.
Alghoniemy, 2004, Geometric invariance in image watermarking, IEEE Trans. Image Process., 13, 145, 10.1109/TIP.2004.823831
Kim, 2003, Invariant image watermark using Zernike moments, IEEE Trans. Circuits Syst. Video Technol., 13, 766, 10.1109/TCSVT.2003.815955
Y. Xin, S. Liao, M. Pawlak, Geometrically robust image watermarking via pseudo-Zernike moments, in: Proceedings of the Canadian Conference Electrical and Computer Engineering, vol. 2, May 2004, pp. 939–942.
A. Herrigel, S. Voloshynovskiy, Y.B. Rytsar, Watermark template attack, in: Proceedings of SPIE Security and Watermarking of Multimedia Contents III, vol. 4314, January 2001, pp. 394–405.
M. Kutter, S.K. Bhattacharjee, T. Ebrahimi, Toward second generation watermarking schemes, in: Proceedings of IEEE International Conference Image Processing, vol. 1, Kobe, Japan, October 1999, pp. 320–323.
Bas, 2002, Geometrically invariant watermarking using feature points, IEEE Trans. Image Process., 11, 1014, 10.1109/TIP.2002.801587
Tang, 2003, A feature-based robust digital image watermarking scheme, IEEE Trans. Signal. Process., 51, 950, 10.1109/TSP.2003.809367
S. Bhattacharjee, M. Kutter, Compression tolerant image authentication, in: Proceedings of the IEEE International Conference Image Processing, vol. 1, 1998, pp. 435–439.
D. Delannay, B.M. Macq, Method for hiding synchronization marks in scale- and rotation-resilient watermarking schemes, in: Proceedings of SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, 2002, pp. 548–554.
Su, 2005, Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance, IEEE Trans. Multimedia, 7, 52, 10.1109/TMM.2004.840614
Kang, 2003, A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression, IEEE Trans. Circuits Syst. Video Technol., 13, 776, 10.1109/TCSVT.2003.815957
Simitopoulos, 2003, Robust image watermarking based on generalized Radon transformations, IEEE Trans. Circuits Syst. Video Technol., 13, 732, 10.1109/TCSVT.2003.815947
M.Y. Wu, Y.K. Ho, A robust object-based watermarking scheme based on shape self-similarity segmentation, in: Proceedings of Fifth International Symposium Multimedia Software Engineering, December 2003, pp. 110–113.
C. Harris, M. Stephen, A combined corner and edge detector, in: Proceedings of Fourth Alvey Vision Conference, Manchester, 1988, pp. 147–151.
J. Devars, C. Achard-Rouquet, E. Bigorgne, Un detecteur de point carateristiques sur des images multispectrales extension vers un detecteur sub-pixellique, in: Proceedings of GRETSI’99, September 1999, pp. 627–630.
Smith, 1997, SUSAN—a new approach to low level image processing, Int. J. Comput. Vis., 23, 45, 10.1023/A:1007963824710
C. Schmid, R. Mohr, C. Bauckhage, Comparing and evaluating interest points, in: Proceedings of the Sixth International Conference on Computer Vision, Bombay, 1998, pp. 230–235.
Heitger, 1992, Simulation of neural contour mechanism: from simple to end-stopped cells, Vis. Res., 32, 963, 10.1016/0042-6989(92)90039-L
W. Forstner, A framework for low level feature extraction, in: Proceedings of the Third European Conference on Computer Vision, Stockholm, Sweden, May 1994, pp. 384–394.
R. Horaud, T. Skordas, F. Veillon, Finding geometric and relational structures in an image, in: Proceedings of the First European Conference on Computer Vision, Antibes, France, 1990, pp. 374–384.
J. C. Cottier, Extraction et appariements robustes des points d’int6rkt de deux images non etalonnees, Technical Report, LIFA-IMAG-INRIA, Rhone-Alpes, 1994.
H. Moravec, Obstacle avoidance and navigation in the real world by a seen robot rover, Robotics Institute, Carnegie-Mellon Univ., Pittsburgh, PA, Tech. Rep. CMU-RI-TR-3, September 1980.
F.J. MacWilliams, N.J. Sloane, Theory of Error Correcting Codes, North-Holland, Amsterdam, Netherlands, 1977.
Cox, 1997, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Process., 6, 1673, 10.1109/83.650120
Hwang, 1999, A watermarking technique based on one-way hashing functions, IEEE Trans. Consumer Electron., 25, 286, 10.1109/30.793411
Hartung, 1998, Watermarking of uncompressed and compressed video, Signal Process., 66, 283, 10.1016/S0165-1684(98)00011-5
S. Pranata, Y.L. Guan, H.C. Chua, BER formulation for the blind retrieval of MPEG video watermark, Lecture Notes in Computer Science, vol. 2613, pp. 91–104, 2003.
Bertin, 1994
Barber, 1996, The Quickhull algorithm for convex hulls, ACM Trans. Math. Software, 22, 469, 10.1145/235815.235821
Hsieh, 2004, Perceptual digital watermarking for image authentication in electronic commerce, Electron. Commerce Res., 4, 157, 10.1023/B:ELEC.0000009286.58045.dd