The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we utilized the relationship between two blocks to generate the robust feature. Such a feature is very stable under various image processing operations. The XOR operation is applied to the feature and the watermark to create the secret key. Moreover, a mechanism is developed to resist the cropping attacks. The experimental results demonstrate our technique is highly robust against image...
As digital technologies advance, it is very easy to forge a paper-based certificate or images to deceive people, and the counterfeits look almost the same as the originals. Because such forgery causes tremendous losses to the society, the demand for automatic and on-line authentication of paper-based images has been increasing. To solve such a problem, watermarking techniques against the “print-and-scan”...
Image watermarking can be distinguished between methods that hide information by adding and multiplying. In some applications, not the more information embedding is, the more performance is especially for multi copyright protection. In this paper, robustness performance of these two watermarking methods are compared with the same conditions, including original image, watermark signal, fidelity, detection...
Due to the instability of and possible attacks on the networks, image files transmitted through the networks may encounter losses of data. Such losses may be recovered by retransmitting or by using image processing techniques. The latter has an obvious advantage that the network traffic could be reduced. In this paper, a self-embedding image recovery algorithm based on adaptively rearranged codebooks...
A feature-based robust watermarking algorithm against geometric transformation is proposed in this paper. As salient features in the image are relatively stable under geometric transformation, they may serve as reference points to synchronize the processes of watermark embedding and detection. To further increase the repeatability of feature detection, a novel feature enhancement technique is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.