The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we utilized the relationship between two blocks to generate the robust feature. Such a feature is very stable under various image processing operations. The XOR operation is applied to the feature and the watermark to create the secret key. Moreover, a mechanism is developed to resist the cropping attacks. The experimental results demonstrate our technique is highly robust against image...
In this paper, we present an authentication and recovery scheme to protect images. The image blocks are DCT transformed and then encoded with different patterns. An optimal selection is adopted to find the best pattern for each block which results in better image quality. Both the recovery and check data are embedded for data protection. The experimental results demonstrate that our method is able...
In this paper, we describe an authentication and recovery scheme for color image protection based on adaptive encoding. The image blocks are categorized based on their contents and different encoding schemes are applied according to their types. Such adaptive encoding results in better image quality and more robust image authentication. The approximations of the luminance and chromatic channels are...
Recently, the protection of the ownership information of digital images have received much attentions because illegal copying of digital multimedia has become much easier due to the advance of multimedia technologies. The ownership information is embedded as a watermark into the image for the purpose of asserting the copyright, hence, it should be very robust against various attempts to break or remove...
Digital watermarking techniques have been used to assert the ownerships of digital images. That is, the ownership information is embedded to an image as a watermark such that the owner of the image could be identified. However, there are also many attacks trying to break or remove the embedded watermark. Therefore, the watermark should be very robust against various kinds of attacks. Among them, the...
A feature-based robust watermarking algorithm against geometric transformation is proposed in this paper. As salient features in the image are relatively stable under geometric transformation, they may serve as reference points to synchronize the processes of watermark embedding and detection. To further increase the repeatability of feature detection, a novel feature enhancement technique is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.