2005
DOI: 10.1109/mmul.2005.46
|View full text |Cite
|
Sign up to set email alerts
|

Geometric Attacks on Image Watermarking Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
48
0
1

Year Published

2006
2006
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 116 publications
(49 citation statements)
references
References 20 publications
0
48
0
1
Order By: Relevance
“…Lastly, Geometric attack is a set of parameters that can be applied on the image. There are many types of geometric attacks such as rotation, cropping, and other transformations [21].…”
Section: Watermark Attacksmentioning
confidence: 99%
“…Lastly, Geometric attack is a set of parameters that can be applied on the image. There are many types of geometric attacks such as rotation, cropping, and other transformations [21].…”
Section: Watermark Attacksmentioning
confidence: 99%
“…Some of these attacks include resizing, scaling, cropping, LSB filliping, JPEG compressing, adding different types of noise, et. al [3,19].…”
Section: Steganalysismentioning
confidence: 99%
“…With the increasing availability of digital multimedia data, the integrity verification of image data becomes more and more important [1]- [3]. Digital images distributed through the Internet may suffer from several possible manipulations [4], as illustrative examples shown in Fig.…”
Section: Introductionmentioning
confidence: 99%
“…To ensure trustworthiness, image copy detection techniques have emerged to search duplicates and forgeries. Traditionally, image copy detection can be achieved via image hashing [1]- [2] or watermarking [3] techniques. Nevertheless, current hashing techniques may be not very robust to some image manipulations while watermarking techniques will suffer from some distortions induced by data embedding.…”
Section: Introductionmentioning
confidence: 99%