Enhancing image watermarking methods with/without reference images by optimization on second-order statistics

The watermarking method has emerged as an important tool for content tracing, authentication, and data hiding in multimedia applications. We propose a watermarking strategy in which the watermark of a host is selected from the robust features of the estimated forged images of the host. The forged im...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society. - 1992. - 11(2002), 7 vom: 15., Seite 771-82
1. Verfasser: Tzeng, Jengnan (VerfasserIn)
Weitere Verfasser: Hwang, Wen-Liang, Chern, I-Liang
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2002
Zugriff auf das übergeordnete Werk:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Schlagworte:Journal Article
LEADER 01000naa a22002652 4500
001 NLM177330171
003 DE-627
005 20231223145953.0
007 cr uuu---uuuuu
008 231223s2002 xx |||||o 00| ||eng c
024 7 |a 10.1109/TIP.2002.800895  |2 doi 
028 5 2 |a pubmed24n0591.xml 
035 |a (DE-627)NLM177330171 
035 |a (NLM)18244673 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Tzeng, Jengnan  |e verfasserin  |4 aut 
245 1 0 |a Enhancing image watermarking methods with/without reference images by optimization on second-order statistics 
264 1 |c 2002 
336 |a Text  |b txt  |2 rdacontent 
337 |a ƒaComputermedien  |b c  |2 rdamedia 
338 |a ƒa Online-Ressource  |b cr  |2 rdacarrier 
500 |a Date Completed 20.05.2010 
500 |a Date Revised 04.02.2008 
500 |a published: Print 
500 |a Citation Status PubMed-not-MEDLINE 
520 |a The watermarking method has emerged as an important tool for content tracing, authentication, and data hiding in multimedia applications. We propose a watermarking strategy in which the watermark of a host is selected from the robust features of the estimated forged images of the host. The forged images are obtained from Monte Carlo simulations of potential pirate attacks on the host image. The solution of applying an optimization technique to the second-order statistics of the features of the forged images gives two orthogonal spaces. One of them characterizes most of the variations in the modifications of the host. Our watermark is embedded in the other space that most potential pirate attacks do not touch. Thus, the embedded watermark is robust. Our watermarking method uses the same framework for watermark detection with a reference and blind detection. We demonstrate the performance of our method under various levels of attacks 
650 4 |a Journal Article 
700 1 |a Hwang, Wen-Liang  |e verfasserin  |4 aut 
700 1 |a Chern, I-Liang  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t IEEE transactions on image processing : a publication of the IEEE Signal Processing Society  |d 1992  |g 11(2002), 7 vom: 15., Seite 771-82  |w (DE-627)NLM09821456X  |x 1941-0042  |7 nnns 
773 1 8 |g volume:11  |g year:2002  |g number:7  |g day:15  |g pages:771-82 
856 4 0 |u http://dx.doi.org/10.1109/TIP.2002.800895  |3 Volltext 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |d 11  |j 2002  |e 7  |b 15  |h 771-82