Histogram-based watermarking schemes are invariant against pixel permutations and can be combined with permutation-based ciphers. However, typical histogram-based watermarking schemes based on comparison of histogram bins are prone to de-synchronization attacks, where the whole histogram is shifted by a certain amount. In this paper we investigate the possibility of avoiding this kind of attacks by synchronizing the embedding and detection processes, using the mean of the histogram as a calibration point. The resulting watermarking scheme is resistant to three common types of shifts of the histogram, while the advantages of previous histogram-based schemes, especially commutativity of watermarking and permutation-based encryption, are prese...
International audienceIn this article, we present a novel reversible watermarking scheme. Its origin...
In this paper an improved method for reversible watermarking is proposed. This scheme is the combina...
Compared with other existing methods, the feature point-based image watermarking schemes can resist ...
Histogram-based watermarking schemes are invariant against pixel permutations and can be combined wi...
Invariant Commutative Watermarking-Encryption means to use a cipher that does not have any impact on...
In this chapter, histogram-based watermarking schemes which are capable of being integrated into a C...
Content-fragile commutative watermarking-encryption requires that both the content-fragile image sig...
Abstract. Content-fragile commutative watermarking-encryption requires that both the content-fragile...
AbstractThis paper proposes a watermarking scheme robust against most common geometric and signal pr...
Developing a watermarking method that is robust to cropping attack and random bending attacks (RBAs)...
The histogram watermark, which performs watermark embedding by slightly modifying the histogram of t...
Cropping and random bending are two common attacks in image watermarking. In this paper we propose a...
Abstract—Digital image histogram is an important global feature, in this paper, histogram will be us...
We propose a new approach to commutative watermarking-encryption (CWE). A permutation cipher is used...
International audienceIn this paper, we propose a new reversible watermarking scheme. Onefirst contr...
International audienceIn this article, we present a novel reversible watermarking scheme. Its origin...
In this paper an improved method for reversible watermarking is proposed. This scheme is the combina...
Compared with other existing methods, the feature point-based image watermarking schemes can resist ...
Histogram-based watermarking schemes are invariant against pixel permutations and can be combined wi...
Invariant Commutative Watermarking-Encryption means to use a cipher that does not have any impact on...
In this chapter, histogram-based watermarking schemes which are capable of being integrated into a C...
Content-fragile commutative watermarking-encryption requires that both the content-fragile image sig...
Abstract. Content-fragile commutative watermarking-encryption requires that both the content-fragile...
AbstractThis paper proposes a watermarking scheme robust against most common geometric and signal pr...
Developing a watermarking method that is robust to cropping attack and random bending attacks (RBAs)...
The histogram watermark, which performs watermark embedding by slightly modifying the histogram of t...
Cropping and random bending are two common attacks in image watermarking. In this paper we propose a...
Abstract—Digital image histogram is an important global feature, in this paper, histogram will be us...
We propose a new approach to commutative watermarking-encryption (CWE). A permutation cipher is used...
International audienceIn this paper, we propose a new reversible watermarking scheme. Onefirst contr...
International audienceIn this article, we present a novel reversible watermarking scheme. Its origin...
In this paper an improved method for reversible watermarking is proposed. This scheme is the combina...
Compared with other existing methods, the feature point-based image watermarking schemes can resist ...