DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection
Tóm tắt
Từ khóa
Tài liệu tham khảo
Akansu AN, Serdijn WA, Selesnick IW (2010) Emerging applications of wavelets: a review. Phys Commun 3(1):1–18
Ali M, Ahn CW (2014) An optimized watermarking technique based on self-adaptive de in dwt–svd transform domain. Signal Process 94:545–556
Ali M, Ahn CW (2015) Comments on ?optimized gray-scale image watermarking using dwt-svd and firefly algorithm?. Expert Syst Appl 42(5):2392–2394
Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using svd and differential evolution in dct domain. Optik-Int J Light Electron Opt 125(1):428–434
Aslantas V (2009) An optimal robust digital image watermarking based on svd using differential evolution algorithm. Optics Commun 282(5):769–777
Barni M, Bartolini F, Cappellini V, Piva A (1998) A dct-domain system for robust image watermarking. Signal Process 66(3):357–372
Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on dwt-svd. Comput Standards Interf 31(5):1002–1013
Bhatnagar G, Wu QJ, Raman B (2012) A new robust adjustable logo watermarking scheme. Comput Secur 31(1):40–58
Bhatnagar G, Wu QJ, Raman B (2013) A new aspect in robust digital watermarking. Multimed Tools Appl 66(2):179–200
Bhatnagar G, Wu QMJ, Atrey PK (2013) Secure randomized image watermarking based on singular value decomposition. ACM Trans Multimed Comput Commun Appl 10(1):4:1–4:21. doi: 10.1145/2542205.2542207
Bianchi T, Piva A (2013) Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Processg Mag 30(2):87–96
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Fowler JE (2005) The redundant discrete wavelet transform and additive noise. IEEE Signal Process Lett 12(9):629–632
Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J Electron Imaging 14(4):043,004–043, 004
Gupta AK, Raval MS (2012) A robust and secure watermarking scheme based on singular values replacement. Sadhana 37(4):425–440
Hamghalam M, Mirzakuchaki S, Akhaee MA (2013) Geometric modeling of the wavelet coefficients for image watermarking. In: 2013 8th Iranian conference on machine vision and image processing (MVIP). IEEE, pp 27–32
Horng SJ, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimed Tools Appl 72(3):3085–3103
Horng SJ, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105
Huang F, Guan ZH (2004) A hybrid svd-dct watermarking method based on lpsnr. Pattern Recog Lett 25(15):1769–1775
Islam MS, Chong U (2015) Performance of a hybrid dct svd visually imperceptible digital watermarking against signal processing attacks. In: Computer science and its applications. Springer, pp 7– 14
Jain C, Arora S, Panigrahi PK (2008) A reliable svd based watermarking schem. arXiv: 0808.0309
Keyvanpour M, Bayat FM (2013) Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the dwt domain. Math Comput Modell 58(1):56–67
Lagzian S, Soryani M, Fathy M (2011) Robust watermarking scheme based on rdwt-svd: Embedding data in all subbands. In: 2011 International symposium on artificial intelligence and signal processing (AISP). IEEE, pp 48–52
Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digit Signal Process 21(4):522–527
Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrument Measur 59(11):3060–3063
Li Q, Wang Z (2009) Reduced-reference image quality assessment using divisive normalization-based image representation. IEEE J Selected Topics Signal Process 3(2):202–211
Lin ET, Delp EJ (1999) A review of fragile image watermarks. In: Proceedings of the multimedia and security workshop (ACM Multimedia’99) multimedia contents. Citeseer, pp 25–29
Lin SD, Shie Sc, Guo JY (2010) Improving the robustness of dct-based image watermarking against jpeg compression. Comput Standards Interfaces 32(1):54–60
Lin WH, Horng SJ, Kao TW, Chen RJ, Chen YH, Lee CL, Terano T (2009) Image copyright protection with forward error correction. Expert Syst Appl 36(9):11,888–11,894
Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757
Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869–9878
Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11,509–11,516
Liu R, Tan T (2002) An svd-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128
Makbol NM, Khoo BE (2013) Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 67(2):102– 112
Megalingam RK, Nair MM, Srikumar R, Balasubramanian VK, Sarma VSV (2010) Performance comparison of novel, robust spatial domain digital image watermarking with the conventional frequency domain watermarking techniques. In: International conference on signal acquisition and processing, 2010. ICSAP’10. IEEE, pp 349–353
Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using dwt–svd and firefly algorithm. Expert Syst Appl 41(17):7858–7867
Mohammad AA, Alhaj A, Shaltaf S (2008) An improved svd-based watermarking scheme for protecting rightful ownership. Signal Process 88(9):2158–2180
Ouhsain M, Hamza AB (2009) Image watermarking scheme using nonnegative matrix factorization and wavelet transform. Expert Syst Appl 36(2):2123–2129
Pandey P, Kumar S, Singh SK (2014) Rightful ownership through image adaptive dwt-svd watermarking algorithm and perceptual tweaking. Multimed Tools Appl 72(1):723–748
Pandey P, Kumar S, Singh SK (2014) A robust logo watermarking technique in divisive normalization transform domain. Multimed Tools Appl 72(3):2653–2677
Peng F, Guo RS, Li CT, Long M (2010) A semi-fragile watermarking algorithm for authenticating 2d cad engineering graphics based on log-polar transformation. Comput-Aided Des 42(12):1207– 1216
Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18(4):33–46
Pun CM (2006) A novel dft-based digital watermarking system for images. In: 2006 8th International conference on signal processing, vol 2. IEEE
Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187–200
Rastegar S, Namazi F, Yaghmaie K, Aliabadian A (2011) Hybrid watermarking algorithm based on singular value decomposition and radon transform. AEU-Int J Electron Commun 65(7):658–663
Rosiyadi D, Horng SJ, Fan P, Wang X, Khan MK, Pan Y (2012) Copyright protection for e-government document images. IEEE MultiMed 19(3):62–73
Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved svd-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689
Shieh JM, Lou DC, Chang MC (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Comput Standards Interf 28(4):428–440
Shivani S, Patel AK, Kamble S, Agarwal S (2011) An effective pixel-wise fragile watermarking scheme based on ara bits. In: Proceedings of the 2011 international conference on communication, computing & security. ACM, pp 221–226
Singh D, Shivani S, Agarwal S (2013) Self-embedding pixel wise fragile watermarking scheme for image authentication. In: Intelligent interactive technologies and multimedia. Springer, pp 111–122
Singh D, Singh SK (2015) Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl:1–25
Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent pp. doi: 10.1016/j.jvcir.2016.04.023 . http://www.sciencedirect.com/science/article/pii/S1047320316300566
Singh P, Chadha R (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol (IJEIT) 2(9)
Solachidis V, Pitas I (2004) Optimal detector for multiplicative watermarks embedded in the dft domain of non-white signals. EURASIP J Appl Signal Process 2004:2522–2532
Song C, Sudirman S, Merabti M (2009) Recent advances and classification of watermarking techniques in digital images. In: Proceedings of post graduate network symposium
Song C, Sudirman S, Merabti M (2012) A robust region-adaptive dual image watermarking technique. J Vis Commun Image Represent 23(3):549–568
Tareef A, Al-Ani A (2015) A highly secure oblivious sparse coding-based watermarking system for ownership verification. Expert Syst Appl 42(4):2224–2233
Wang Y, Doherty JF, Van Dyck RE (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11(2):77–88
Wu L, Zhang J, Deng W, He D (2009) Arnold transformation algorithm and anti-arnold transformation algorithm. In: 2009 1st International conference on information science and engineering (ICISE). IEEE, pp 1164–1167