ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2019
DOI: 10.1109/icassp.2019.8683753
|View full text |Cite
|
Sign up to set email alerts
|

Graph Spectral Domain Blind Watermarking

Abstract: This paper proposes the first ever graph spectral domain blind watermarking algorithm. We explore the recently developed graph signal processing for spread-spectrum watermarking to authenticate the data recorded on non-Cartesian grids, such as sensor data, 3D point clouds, Lidar scans and mesh data. The choice of coefficients for embedding the watermark is driven by the model for minimisation embedding distortion and the robustness model. The distortion minimisation model is proposed to reduce the watermarking… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…The algorithm offered better robustness against common signal-processing operations; however, it has not been tested against any hybrid attacks. Khafaji et al [9] proposed a robust watermarking algorithm by using selected graph Fourier coefficients to embed a watermark. The proposed scheme demonstrated improved robustness against various attacks by establishing a relationship between watermark extraction.…”
Section: Related Researchmentioning
confidence: 99%
“…The algorithm offered better robustness against common signal-processing operations; however, it has not been tested against any hybrid attacks. Khafaji et al [9] proposed a robust watermarking algorithm by using selected graph Fourier coefficients to embed a watermark. The proposed scheme demonstrated improved robustness against various attacks by establishing a relationship between watermark extraction.…”
Section: Related Researchmentioning
confidence: 99%
“…This requires us to hiding information into graph data without impairing the value of the graph data. One can extend conventional media based algorithms to graph data, e.g., [23]. On the other hand, similar to graph steganography in social networks, secret data can be first translated as graphs and then embedded into the host graph data, e.g., [24].…”
Section: Other Graph Strategies In Information Hidingmentioning
confidence: 99%
“…Even so the 3D objects are widely available and important, there are a few existing watermarking techniques. e various watermarking techniques for 3D objects can be classified according to the embedding domains such as the spatial domain [18,19], the spectral-domain [20,21], and the transform domain [22,23].…”
Section: Introductionmentioning
confidence: 99%
“…Even so the 3D objects are widely available and important, there are a few existing watermarking techniques. The various watermarking techniques for 3D objects can be classified according to the embedding domains such as the spatial domain [ 18 , 19 ], the spectral-domain [ 20 , 21 ], and the transform domain [ 22 , 23 ]. The transform domain techniques such as Fourier, Laplace, cosine, and wavelet transform provide a good trade-off between invisibility and robustness.…”
Section: Introductionmentioning
confidence: 99%