In this paper, we propose a robust image watermarking scheme using visually significant feature points, which are determined by end-stopped wavelets feature detector. These feature points can resist various types of common signal processing and geometric attacks and they can be used as synchronization marks between watermark embedding and detection. The watermark is embedded into non overlapping normalized circular regions, which are determined by feature points. The watermark embedding process is carried out by modifying DCT coefficients in selected blocks. The original unmarked image is not required at the watermark extraction. Experimental results show that the proposed scheme successfully makes the watermark perceptually invisible as we...
In this paper, we propose a novel algorithm for robust image watermarking by inserting a single copy...
AbstractThe effectiveness of a digital watermarking algorithm is indicated by the robustness of embe...
AbstractIn digital management, multimedia content and data can easily be used in an illegal way—bein...
In this paper, we propose a robust image watermarking scheme using visually significant feature poin...
The robustness of watermarks to geometric attacks is viewed as an issue of great importance. Indeed,...
Abstract. This paper addresses feature extraction techniques for robust water-marking. Geometric dis...
Geometric attacks can desynchronize the location of the watermark and hence cause incorrect watermar...
This paper presents a feature-based watermarking scheme which is robust to geometric and common imag...
Image processing technology has been developed rapidly in recent years, and altering the content of ...
This thesis addresses the issue of image watermarking robustness against attacks and especially geom...
In this paper, a wavelet based image watermarking scheme for copyright protection is proposed. In or...
Watermark synchronization is very crucial to design robust image watermarking scheme. In this paper,...
Abstract—In this paper, a robust watermarking algorithm using the wavelet transform and edge detecti...
In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is pre...
AbstractThe growth of the Internet has increased the phenomenon of digital piracy, in multimedia obj...
In this paper, we propose a novel algorithm for robust image watermarking by inserting a single copy...
AbstractThe effectiveness of a digital watermarking algorithm is indicated by the robustness of embe...
AbstractIn digital management, multimedia content and data can easily be used in an illegal way—bein...
In this paper, we propose a robust image watermarking scheme using visually significant feature poin...
The robustness of watermarks to geometric attacks is viewed as an issue of great importance. Indeed,...
Abstract. This paper addresses feature extraction techniques for robust water-marking. Geometric dis...
Geometric attacks can desynchronize the location of the watermark and hence cause incorrect watermar...
This paper presents a feature-based watermarking scheme which is robust to geometric and common imag...
Image processing technology has been developed rapidly in recent years, and altering the content of ...
This thesis addresses the issue of image watermarking robustness against attacks and especially geom...
In this paper, a wavelet based image watermarking scheme for copyright protection is proposed. In or...
Watermark synchronization is very crucial to design robust image watermarking scheme. In this paper,...
Abstract—In this paper, a robust watermarking algorithm using the wavelet transform and edge detecti...
In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is pre...
AbstractThe growth of the Internet has increased the phenomenon of digital piracy, in multimedia obj...
In this paper, we propose a novel algorithm for robust image watermarking by inserting a single copy...
AbstractThe effectiveness of a digital watermarking algorithm is indicated by the robustness of embe...
AbstractIn digital management, multimedia content and data can easily be used in an illegal way—bein...