The histogram watermark, which performs watermark embedding by slightly modifying the histogram of the original image, has been a hot research topic in information hiding technology due to the superiority of its pixel modification during the watermark embedding process, which is independent of the pixel position. This property makes the histogram-based watermark strong resistant to geometric attacks, such as cropping attack, crossed attack, rotation attack, etc. In this paper, we propose a large capacity histogram-based robust watermarking algorithm based on three consecutive bins for the first time. In our scheme, we divide the shape of three consecutive bins into eight cases. According to these cases, we embed Information Number 0, 1, 2, ...
This thesis addresses the issue of image watermarking robustness against attacks and especially geom...
[[abstract]]Traditional watermarking schemes are sensitive to geometric distortions, in which synchr...
AbstractThe effectiveness of a digital watermarking algorithm is indicated by the robustness of embe...
Abstract—Digital image histogram is an important global feature, in this paper, histogram will be us...
Developing a watermarking method that is robust to cropping attack and random bending attacks (RBAs)...
AbstractThis paper proposes a watermarking scheme robust against most common geometric and signal pr...
Cropping and random bending are two common attacks in image watermarking. In this paper we propose a...
Histogram-based watermarking schemes are invariant against pixel permutations and can be combined wi...
Abstract—A robust and geometric invariant digital watermarking scheme for gray-level images is propo...
Invariant Commutative Watermarking-Encryption means to use a cipher that does not have any impact on...
Compared with other existing methods, the feature point-based image watermarking schemes can resist ...
This paper presents a novel multiple digital watermarking technique for the copyright protection of ...
Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. ...
Data hiding techniques have been widely used to preserve privacy information in the current age medi...
In this chapter, histogram-based watermarking schemes which are capable of being integrated into a C...
This thesis addresses the issue of image watermarking robustness against attacks and especially geom...
[[abstract]]Traditional watermarking schemes are sensitive to geometric distortions, in which synchr...
AbstractThe effectiveness of a digital watermarking algorithm is indicated by the robustness of embe...
Abstract—Digital image histogram is an important global feature, in this paper, histogram will be us...
Developing a watermarking method that is robust to cropping attack and random bending attacks (RBAs)...
AbstractThis paper proposes a watermarking scheme robust against most common geometric and signal pr...
Cropping and random bending are two common attacks in image watermarking. In this paper we propose a...
Histogram-based watermarking schemes are invariant against pixel permutations and can be combined wi...
Abstract—A robust and geometric invariant digital watermarking scheme for gray-level images is propo...
Invariant Commutative Watermarking-Encryption means to use a cipher that does not have any impact on...
Compared with other existing methods, the feature point-based image watermarking schemes can resist ...
This paper presents a novel multiple digital watermarking technique for the copyright protection of ...
Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. ...
Data hiding techniques have been widely used to preserve privacy information in the current age medi...
In this chapter, histogram-based watermarking schemes which are capable of being integrated into a C...
This thesis addresses the issue of image watermarking robustness against attacks and especially geom...
[[abstract]]Traditional watermarking schemes are sensitive to geometric distortions, in which synchr...
AbstractThe effectiveness of a digital watermarking algorithm is indicated by the robustness of embe...