2007
DOI: 10.1016/j.sigpro.2006.11.002
|View full text |Cite
|
Sign up to set email alerts
|

A robust content-based digital image watermarking scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
49
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 98 publications
(49 citation statements)
references
References 23 publications
0
49
0
Order By: Relevance
“…A feature-based watermarking scheme was first proposed in [5] where the authors use the Mexican Hat wavelet scale interaction to extract features in the image that can resist a series of attacks which makes them suitable to be used as emplacement to insert and to extract the mark. Another content-based approach in [6] uses a reworked copy of the traditional Harris corner detector. The reworked copy calculates the corner response function within a circular window originate from the image centre and covers the largest area of it to resist image centre based rotation attacks.…”
Section: Related Workmentioning
confidence: 99%
“…A feature-based watermarking scheme was first proposed in [5] where the authors use the Mexican Hat wavelet scale interaction to extract features in the image that can resist a series of attacks which makes them suitable to be used as emplacement to insert and to extract the mark. Another content-based approach in [6] uses a reworked copy of the traditional Harris corner detector. The reworked copy calculates the corner response function within a circular window originate from the image centre and covers the largest area of it to resist image centre based rotation attacks.…”
Section: Related Workmentioning
confidence: 99%
“…A featurebased watermarking scheme was first proposed in [5] where the authors use the Mexican Hat wavelet scale interaction to extract features in the image that can resist a series of attacks which makes them suitable to be used as emplacement to insert and to extract the watermark. Another content-based approach in [6] uses a reworked copy of the traditional Harris corner detector. The reworked copy calculates the corner response function within a circular window originate from the image centre and covers the largest area of it to resist image centre based rotation attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Contrariwise, invisible watermarks are used in digital image applications, where watermarking objectives are to addressing security issues of the images. Like various digital image applications [68][69][70][71][72][73][74][75][76], invisibility of the watermark appears to be the main interest in the research of medical imaging [8-10, 12, 13, 41, 77-79].…”
Section: Choice Of Design and Evaluation Parametersmentioning
confidence: 99%
“…In a robust watermarking, a watermark usually carries information regarding the owner in order to validate who the image belongs to (e.g., which person, which institute or organization, etc.). Thus, these watermarking schemes are being used for content authentication purposes in various digital image applications (e.g., copyright protection) [68,73,79,[82][83][84][85][86]. Semi-fragile and fragile watermarks are being used to carry much information about itself, its owner's metadata, its distribution, etc., and are thus used for annotation (e.g., hiding ETR or EPR, etc.)…”
Section: Choice Of Design and Evaluation Parametersmentioning
confidence: 99%