Robust Image Watermarking Theories and Techniques: A Review

Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect the copyright of digital contents by storing, transmitting and processing information encoded in systems where digital content can easily be...

Full description

Saved in:
Bibliographic Details
Published inJournal of applied research and technology Vol. 12; no. 1; pp. 122 - 138
Main Authors Tao, Hai, Chongmin, Li, Mohamad Zain, Jasni, Abdalla, Ahmed N.
Format Journal Article
LanguageEnglish
Published Elsevier España, S.L.U 01.02.2014
Subjects
Online AccessGet full text
ISSN1665-6423
DOI10.1016/S1665-6423(14)71612-8

Cover

Abstract Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect the copyright of digital contents by storing, transmitting and processing information encoded in systems where digital content can easily be disseminated through communication channels? Today it is understood that the answer is yes. This paper reviews the theoretical analysis and performance investigation of representative watermarking systems in transform domains and geometric invariant regions. Digital watermarking is a technology of embedding watermark with intellectual property rights into images, videos, audios, and other multimedia data by a certain algorithm. The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. Moreover, it is concluded that various attacks operators are used for the assessment of watermarking systems, which supplies an automated and fair analysis of substantial watermarking methods for chosen application areas.
AbstractList Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect the copyright of digital contents by storing, transmitting and processing information encoded in systems where digital content can easily be disseminated through communication channels? Today it is understood that the answer is yes. This paper reviews the theoretical analysis and performance investigation of representative watermarking systems in transform domains and geometric invariant regions. Digital watermarking is a technology of embedding watermark with intellectual property rights into images, videos, audios, and other multimedia data by a certain algorithm. The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. Moreover, it is concluded that various attacks operators are used for the assessment of watermarking systems, which supplies an automated and fair analysis of substantial watermarking methods for chosen application areas.
Author Abdalla, Ahmed N.
Chongmin, Li
Tao, Hai
Mohamad Zain, Jasni
Author_xml – sequence: 1
  givenname: Hai
  surname: Tao
  fullname: Tao, Hai
  organization: Faculty of Computer System and Software Engineering, University Malaysia Pahang, Malaysia
– sequence: 2
  givenname: Li
  surname: Chongmin
  fullname: Chongmin, Li
  organization: Department of mathematics and information, Qinghai Normal University, China
– sequence: 3
  givenname: Jasni
  surname: Mohamad Zain
  fullname: Mohamad Zain, Jasni
  organization: Faculty of Computer System and Software Engineering, University Malaysia Pahang, Malaysia
– sequence: 4
  givenname: Ahmed N.
  surname: Abdalla
  fullname: Abdalla, Ahmed N.
  organization: Faculty of Electrical and Electronic Engineering, University Malaysia Pahang, Malaysia
BookMark eNqFz81KAzEUhuEsKthWL0HIUhejyUySydiFlOJPoSDUEZchTU7baJvRJFW8e6etuHDT1YED7wdPD3V84wGhM0ouKaHi6okKwTPB8uKcsouSCppnsoO6f-9j1IvxlRAhJSNdNJg2s01MeLzWC8AvOkFY6_Dm_ALXS2iCg4i1t7gGs_TuYwPxGg_xFD4dfJ2go7leRTj9vX30fHdbjx6yyeP9eDScZIblecrKijPLGZfAOeXEShCspFUhiC4ZI6YUosh5RfRMSKarGTcVqQpiNa9s0aKKPhrsd01oYgwwV8YlnVzjU9BupShRW7va2dUWqShTO7uSbc3_1e_Btcbvg93NvoOW1nKDisaBN2BdAJOUbdyBhR-pwHLq
CitedBy_id crossref_primary_10_1088_1757_899X_872_1_012001
crossref_primary_10_1007_s11554_024_01559_w
crossref_primary_10_1155_2018_6712065
crossref_primary_10_1007_s11042_016_3734_2
crossref_primary_10_3390_sym10030077
crossref_primary_10_3390_info11020110
crossref_primary_10_1007_s11042_022_12738_x
crossref_primary_10_1007_s11042_024_20258_z
crossref_primary_10_1016_j_jksuci_2021_07_012
crossref_primary_10_29252_jsdp_17_4_15
crossref_primary_10_1109_TCSVT_2023_3295895
crossref_primary_10_1016_j_sysarc_2020_101897
crossref_primary_10_1007_s11554_017_0674_7
crossref_primary_10_1007_s11042_018_5889_5
crossref_primary_10_1109_ACCESS_2020_3035428
crossref_primary_10_1007_s11042_021_11237_9
crossref_primary_10_1007_s11042_023_14618_4
crossref_primary_10_3390_electronics10141744
crossref_primary_10_3233_JIFS_202468
crossref_primary_10_1007_s11042_018_6975_4
crossref_primary_10_4018_IJSITA_2019100101
crossref_primary_10_1109_ACCESS_2017_2682109
crossref_primary_10_1186_s13677_023_00468_w
crossref_primary_10_3390_math9151795
crossref_primary_10_32604_cmc_2023_036317
crossref_primary_10_1007_s00500_019_04297_5
crossref_primary_10_1155_2022_5271600
crossref_primary_10_1007_s11042_018_5881_0
crossref_primary_10_1007_s11042_018_7085_z
crossref_primary_10_1038_s41598_024_67074_x
crossref_primary_10_1007_s41060_025_00723_0
crossref_primary_10_1007_s11042_018_5814_y
crossref_primary_10_1007_s11042_020_08881_y
crossref_primary_10_1007_s11771_022_4941_9
crossref_primary_10_1016_j_apenergy_2024_123545
crossref_primary_10_1007_s13369_017_2531_1
crossref_primary_10_1002_spy2_196
crossref_primary_10_1016_j_image_2020_116019
crossref_primary_10_69974_glskalp_01_01_49
crossref_primary_10_1177_0142331216640868
crossref_primary_10_1007_s11042_016_3485_0
crossref_primary_10_1016_j_compeleceng_2018_03_007
crossref_primary_10_3390_app14010435
crossref_primary_10_3390_e25070963
crossref_primary_10_1007_s11042_023_16459_7
crossref_primary_10_1016_j_bspc_2024_106557
crossref_primary_10_1007_s11071_018_4295_x
crossref_primary_10_1631_FITEE_1500165
crossref_primary_10_1088_1742_6596_1918_4_042014
crossref_primary_10_1007_s11042_021_11798_9
crossref_primary_10_1007_s00371_023_03028_0
crossref_primary_10_1007_s00371_024_03271_z
crossref_primary_10_1117_1_JEI_31_4_043043
crossref_primary_10_32604_cmc_2024_046305
crossref_primary_10_3390_s21165540
crossref_primary_10_3390_app15010057
crossref_primary_10_1007_s11042_023_15324_x
crossref_primary_10_3390_sym12030486
crossref_primary_10_1007_s11042_023_15554_z
crossref_primary_10_1007_s00034_023_02491_3
crossref_primary_10_1016_j_ijleo_2022_169280
crossref_primary_10_1007_s11082_019_2130_3
crossref_primary_10_1109_ACCESS_2018_2808172
crossref_primary_10_32604_cmc_2024_055150
crossref_primary_10_1155_2023_5060564
crossref_primary_10_1016_j_jisa_2018_12_002
crossref_primary_10_3390_fi9030045
crossref_primary_10_1002_spy2_216
crossref_primary_10_1145_3701558
crossref_primary_10_1007_s13369_019_03883_x
crossref_primary_10_1109_ACCESS_2024_3374201
crossref_primary_10_1016_j_jisa_2022_103414
crossref_primary_10_21122_2309_4923_2020_2_72_76
crossref_primary_10_1016_j_asoc_2023_110271
crossref_primary_10_1007_s11220_019_0270_y
crossref_primary_10_1007_s10044_017_0613_z
crossref_primary_10_1007_s12652_022_03771_7
crossref_primary_10_1007_s11042_019_08423_1
crossref_primary_10_1049_iet_ifs_2019_0601
crossref_primary_10_1007_s11760_024_03182_5
crossref_primary_10_1007_s11554_020_00941_8
crossref_primary_10_21205_deufmd_2021236816
crossref_primary_10_1016_j_ins_2024_121521
crossref_primary_10_1080_02522667_2017_1372153
crossref_primary_10_1007_s11042_024_18982_7
crossref_primary_10_17671_gazibtd_338753
crossref_primary_10_1007_s12530_021_09369_2
crossref_primary_10_1016_j_jksuci_2023_101698
crossref_primary_10_3390_a17010032
crossref_primary_10_1109_TCSVT_2022_3224243
Cites_doi 10.1016/j.amc.2005.11.015
10.1109/35.940053
10.22201/icat.16656423.2010.8.03.454
10.1109/TIT.2002.808134
10.1109/83.650120
10.1109/LSP.2003.822923
10.22201/icat.16656423.2012.10.3.397
10.1080/0161-118991863745
10.1109/6046.890056
10.1145/1242471.1242473
10.1117/12.263419
10.1117/12.586876
10.1016/j.sigpro.2009.02.005
10.22201/icat.16656423.2012.10.2.398
10.1109/MMUL.2005.46
10.1016/S1665-6423(13)71536-0
10.1016/j.patcog.2003.12.013
10.1109/TIP.2002.801587
10.1109/LSP.2004.840872
10.1016/S0165-1684(98)00012-7
10.1117/12.385011
10.1109/TSP.2003.809367
10.22201/icat.16656423.2003.1.01.613
10.1109/83.913599
10.1016/j.aeue.2007.11.007
10.1117/12.385012
10.1109/TIP.2005.860318
10.1117/12.586890
10.1117/12.337432
10.1109/TSP.2004.839901
10.1117/1.482648
10.1016/0167-8655(93)90114-S
10.1109/83.846253
10.1016/S1665-6423(13)71584-0
10.1109/5.771065
10.1109/49.668980
10.1117/12.503186
10.1117/12.435442
10.1109/TCSVT.2004.836745
10.1109/ICIP.2002.1039014
10.1109/ICME.2000.871003
ContentType Journal Article
Copyright 2014 Universidad Nacional Autónoma de México
Copyright_xml – notice: 2014 Universidad Nacional Autónoma de México
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/S1665-6423(14)71612-8
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EndPage 138
ExternalDocumentID 10_1016_S1665_6423_14_71612_8
S1665642314716128
GroupedDBID 0R~
0SF
2WC
4.4
457
5GY
5VS
635
6I.
AACTN
AAEDT
AAEDW
AAFTH
AAIKJ
AALRI
AAXUO
ABMAC
ADBBV
ADCUG
ADDVE
ADEZE
AEXQZ
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
APOWU
AZFZN
DU5
E3Z
EBS
EJD
FDB
GROUPED_DOAJ
KQ8
KWQ
M41
NCXOZ
O9-
OK1
RDY
RNS
ROL
RSH
SCD
SSZ
TR2
AAFWJ
AAYWO
AAYXX
ACVFH
ADCNI
ADVLN
AEUPX
AFPUW
AIGII
AKBMS
AKRWK
AKYEP
CITATION
ID FETCH-LOGICAL-c422t-7954d5458e55150d8e64719360a7440c76632590ab684a9b5c90930da59d31013
ISSN 1665-6423
IngestDate Tue Jul 01 01:34:44 EDT 2025
Thu Apr 24 23:12:40 EDT 2025
Tue May 16 23:59:34 EDT 2023
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords watermarking
security
robust
attacks
Language English
License http://creativecommons.org/licenses/by-nc-nd/4.0
http://www.elsevier.com/tdm/userlicense/1.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c422t-7954d5458e55150d8e64719360a7440c76632590ab684a9b5c90930da59d31013
OpenAccessLink https://dx.doi.org/10.1016/S1665-6423(14)71612-8
PageCount 17
ParticipantIDs crossref_citationtrail_10_1016_S1665_6423_14_71612_8
crossref_primary_10_1016_S1665_6423_14_71612_8
elsevier_sciencedirect_doi_10_1016_S1665_6423_14_71612_8
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-02-01
PublicationDateYYYYMMDD 2014-02-01
PublicationDate_xml – month: 02
  year: 2014
  text: 2014-02-01
  day: 01
PublicationDecade 2010
PublicationTitle Journal of applied research and technology
PublicationYear 2014
Publisher Elsevier España, S.L.U
Publisher_xml – name: Elsevier España, S.L.U
References Pitas (bib0290) 1996
Yuan, Ling, Lu, Yu (bib0370) 2006
Bas, Chassery, Macq (bib0035) 2002; 11
Lu, Lu, Chung (bib0205) 2006; 177
Tao, Dickinson (bib0350) 1996; 4
Deng, Gao, Li, Tao (bib0110) 2009; 89
Takahashi, Nishimura, Suzuki (bib0340) 2005; 53
Pereira, Pun (bib0255) 2000; 9
Elbaşı (bib0405) 2012; 10
Alghoniemy, Tewfik (bib0010) 2000; 3
in: Stirmark 3.0 (60).
Cox, Linnartz (bib0065) 1998; 6
Licks, Jordan (bib0185) 2005; 12
Lu, Huang, Sze, Mark (bib0200) 2000; 2
Stankovic, Djurovic, Pitas (bib0320) 2001; 10
Su, Girod (bib0330) 1999
Cayre F., Fontaine C. and Furon T., 2005. Watermarking security, part I: theory, In: Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE. 5681.
Cayre F., Fontaine C. and Furon T., 2005. Watermarking security, part II: practice, In: Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE. 5681.
Cox, Miller (bib0080) 1997
Delannay, Macq (bib0105) 2000; 2
Kim, Choi, Lee, Kim (bib0140) 2004; 2
Christian, Jana, Andreas (bib0055) 2006
Kurak, McHugh (bib0385) 1992
Li, Guo (bib0175) 2007; 63
Kalker (bib0135) 2001
Bao, Ma (bib0170) 2005; 15
Macq, Dittmann, Delp (bib0215) 2004; 92
StirMark Benchmark
Tang, Hang (bib0345) 2003; 51
Cox, Miller, Bloom, Fridrich, Kalker (bib0075) 2007
Petitcolas, Anderson, Kuhn (bib0285) 1999; 87
Deguillaume, Csurka, Pun (bib0100) 2000
Luis, Pedro, Fernando (bib0210) 2005
Taboada, Larralde, Brito, Vega-Alvarado, Diaz, Galindo, Corkidi (bib0335) 2009; 1
Alghoniemy, Tewfik (bib0015) 2006; 15
Moulin, O'sullivan (bib0250) 1999; 49
Petitcolas, Steinebach, Raynal, Dittmann, Fontaine, Fates (bib0280) 2001; 4314
Lee, Kim, Lee (bib0165) 2006; 45
Vukmirović, Erdeljan, Imre, Čapko (bib0360) 2012; 10
Kutter, Jordan, Bossen (bib0155) 1998; 7
Checkmark Benchmarking
Cox, Kilian, Leighton, Shamoon (bib0090) 1997; 6
Voloshynovskiy (bib0355) 2001; 39
Coltuc, Bolon (bib0060) 1999; 2
Mikolajczyk, Schmid (bib0230) 2002; 2350
Barni (bib0030) 2005; 12
Cox, Miller, Bloom (bib0070) 2001
Liang, Cheng, Yang, Zhang (bib0415) 2013; 11
Dong, Galatsanos (bib0115) 2002; 3
Lin, Wu, Bloom, Cox, Miller, Lui (bib0190) 2000; 3971
Molina, Higuera, Prieto, Sandoval (bib0245) 2006
Petitcolas, Anderson (bib0270) 1998
Zheng, Liu, Zhao (bib0375) 2007; 39
Alvarez, Perez (bib0020) 2002; 17
Petitcolas, Anderson, Kuhn (bib0275) 1999; 87
Seo, Yoo (bib0310) 2006; 54
Cox (bib0085) 1996
Cedillo-Hernandez, Nakano-Miyatake, Garcia-Ugalde, Perez-Meana (bib0410) 2013; 11
2006
Merhav (bib0225) 2005
Mikolajczyk, Schmid (bib0240) 2002
Seo, Yoo (bib0305) 2004; 37
Cruz-Ramos, Reyes-Reyes, Nakano-Miyatake, Pérez-Meana (bib0400) 2010; 8
Kutter, Bhattacharjee, Ebrahimi (bib0150) 1999; 1
Zhang, Li, Wei (bib0395) 2012; 10
Matthew (bib0220) 1989; 8
Craver, Memon, Yeo, Yeung (bib0095) 1997; 3022
Solachidis, Pitas (bib0315) 2000
Perrig (bib0260) 1997
Petitcolas F., 1999.
Prado-Molina, Peralta-Higuera, Palacio-Prieto, Sandoval (bib0295) 2010; 4
Lichtenauer, Setyawan, Kalker, Lagendijk (bib0180) 2003; 5
Elbaşı (bib0120) 2012; 10
Langelaar, Lagendijk, Biemond (bib0160) 1998
Pereira, Pun (bib0380) 2000; 9
Alghoniemy, Tewfik (bib0005) 2000; 3971
Holliman, Memon, Yeung (bib0130) 1999
Yu, Lu, Ling (bib0365) 2006
Lin, Brandt (bib0195) 1993; 14
Mikolajczyk (bib0235) 2002
Andreas, Jana (bib0025) 2006
Herrigel, Voloshynovskiy, Rytsar (bib0125) 2001
Ruanaidh, Pun (bib0300) 1998; 66
Kutter (bib0145) 1999; 3528
Pitas (bib0390) 1996
Holliman (10.1016/S1665-6423(14)71612-8_bib0130) 1999
Kim (10.1016/S1665-6423(14)71612-8_bib0140) 2004; 2
Petitcolas (10.1016/S1665-6423(14)71612-8_bib0270) 1998
Matthew (10.1016/S1665-6423(14)71612-8_bib0220) 1989; 8
Taboada (10.1016/S1665-6423(14)71612-8_bib0335) 2009; 1
Licks (10.1016/S1665-6423(14)71612-8_bib0185) 2005; 12
Cedillo-Hernandez (10.1016/S1665-6423(14)71612-8_bib0410) 2013; 11
Li (10.1016/S1665-6423(14)71612-8_bib0175) 2007; 63
Macq (10.1016/S1665-6423(14)71612-8_bib0215) 2004; 92
Vukmirović (10.1016/S1665-6423(14)71612-8_bib0360) 2012; 10
Lee (10.1016/S1665-6423(14)71612-8_bib0165) 2006; 45
Bas (10.1016/S1665-6423(14)71612-8_bib0035) 2002; 11
Cox (10.1016/S1665-6423(14)71612-8_bib0080) 1997
Cox (10.1016/S1665-6423(14)71612-8_bib0070) 2001
Elbaşı (10.1016/S1665-6423(14)71612-8_bib0120) 2012; 10
Luis (10.1016/S1665-6423(14)71612-8_bib0210) 2005
Seo (10.1016/S1665-6423(14)71612-8_bib0305) 2004; 37
Voloshynovskiy (10.1016/S1665-6423(14)71612-8_bib0355) 2001; 39
Alghoniemy (10.1016/S1665-6423(14)71612-8_bib0015) 2006; 15
Delannay (10.1016/S1665-6423(14)71612-8_bib0105) 2000; 2
Pitas (10.1016/S1665-6423(14)71612-8_bib0390) 1996
Mikolajczyk (10.1016/S1665-6423(14)71612-8_bib0230) 2002; 2350
Yu (10.1016/S1665-6423(14)71612-8_bib0365) 2006
Coltuc (10.1016/S1665-6423(14)71612-8_bib0060) 1999; 2
Petitcolas (10.1016/S1665-6423(14)71612-8_bib0280) 2001; 4314
Cox (10.1016/S1665-6423(14)71612-8_bib0065) 1998; 6
Herrigel (10.1016/S1665-6423(14)71612-8_bib0125) 2001
Cox (10.1016/S1665-6423(14)71612-8_bib0090) 1997; 6
Lichtenauer (10.1016/S1665-6423(14)71612-8_bib0180) 2003; 5
Prado-Molina (10.1016/S1665-6423(14)71612-8_bib0295) 2010; 4
Kutter (10.1016/S1665-6423(14)71612-8_bib0155) 1998; 7
Tao (10.1016/S1665-6423(14)71612-8_bib0350) 1996; 4
Lu (10.1016/S1665-6423(14)71612-8_bib0200) 2000; 2
Stankovic (10.1016/S1665-6423(14)71612-8_bib0320) 2001; 10
Liang (10.1016/S1665-6423(14)71612-8_bib0415) 2013; 11
10.1016/S1665-6423(14)71612-8_bib0265
Deng (10.1016/S1665-6423(14)71612-8_bib0110) 2009; 89
Takahashi (10.1016/S1665-6423(14)71612-8_bib0340) 2005; 53
Su (10.1016/S1665-6423(14)71612-8_bib0330) 1999
Alvarez (10.1016/S1665-6423(14)71612-8_bib0020) 2002; 17
Alghoniemy (10.1016/S1665-6423(14)71612-8_bib0005) 2000; 3971
Alghoniemy (10.1016/S1665-6423(14)71612-8_bib0010) 2000; 3
Tang (10.1016/S1665-6423(14)71612-8_bib0345) 2003; 51
Petitcolas (10.1016/S1665-6423(14)71612-8_bib0285) 1999; 87
Merhav (10.1016/S1665-6423(14)71612-8_bib0225) 2005
Cox (10.1016/S1665-6423(14)71612-8_bib0075) 2007
Yuan (10.1016/S1665-6423(14)71612-8_bib0370) 2006
Andreas (10.1016/S1665-6423(14)71612-8_bib0025) 2006
Zhang (10.1016/S1665-6423(14)71612-8_bib0395) 2012; 10
Cox (10.1016/S1665-6423(14)71612-8_bib0085) 1996
Moulin (10.1016/S1665-6423(14)71612-8_bib0250) 1999; 49
Kurak (10.1016/S1665-6423(14)71612-8_bib0385) 1992
10.1016/S1665-6423(14)71612-8_bib0050
Zheng (10.1016/S1665-6423(14)71612-8_bib0375) 2007; 39
Perrig (10.1016/S1665-6423(14)71612-8_bib0260) 1997
Kalker (10.1016/S1665-6423(14)71612-8_bib0135) 2001
Kutter (10.1016/S1665-6423(14)71612-8_bib0145) 1999; 3528
Kutter (10.1016/S1665-6423(14)71612-8_bib0150) 1999; 1
Ruanaidh (10.1016/S1665-6423(14)71612-8_bib0300) 1998; 66
Lu (10.1016/S1665-6423(14)71612-8_bib0205) 2006; 177
Deguillaume (10.1016/S1665-6423(14)71612-8_bib0100) 2000
Lin (10.1016/S1665-6423(14)71612-8_bib0195) 1993; 14
Pitas (10.1016/S1665-6423(14)71612-8_bib0290) 1996
Pereira (10.1016/S1665-6423(14)71612-8_bib0380) 2000; 9
Dong (10.1016/S1665-6423(14)71612-8_bib0115) 2002; 3
Cruz-Ramos (10.1016/S1665-6423(14)71612-8_bib0400) 2010; 8
Elbaşı (10.1016/S1665-6423(14)71612-8_bib0405) 2012; 10
Langelaar (10.1016/S1665-6423(14)71612-8_bib0160) 1998
Seo (10.1016/S1665-6423(14)71612-8_bib0310) 2006; 54
Christian (10.1016/S1665-6423(14)71612-8_bib0055) 2006
Craver (10.1016/S1665-6423(14)71612-8_bib0095) 1997; 3022
Petitcolas (10.1016/S1665-6423(14)71612-8_bib0275) 1999; 87
Solachidis (10.1016/S1665-6423(14)71612-8_bib0315) 2000
Pereira (10.1016/S1665-6423(14)71612-8_bib0255) 2000; 9
10.1016/S1665-6423(14)71612-8_bib0325
Bao (10.1016/S1665-6423(14)71612-8_bib0170) 2005; 15
Molina (10.1016/S1665-6423(14)71612-8_bib0245) 2006
10.1016/S1665-6423(14)71612-8_bib0040
Barni (10.1016/S1665-6423(14)71612-8_bib0030) 2005; 12
Lin (10.1016/S1665-6423(14)71612-8_bib0190) 2000; 3971
Mikolajczyk (10.1016/S1665-6423(14)71612-8_bib0235) 2002
Mikolajczyk (10.1016/S1665-6423(14)71612-8_bib0240) 2002
10.1016/S1665-6423(14)71612-8_bib0045
References_xml – volume: 14
  start-page: 369
  year: 1993
  end-page: 379
  ident: bib0195
  article-title: Towards absolute invariants of images under translation, rotation and dilatation
  publication-title: Pattern Recognit. Lett.
– reference: , in: Stirmark 3.0 (60).
– volume: 51
  start-page: 950
  year: 2003
  end-page: 959
  ident: bib0345
  article-title: A feature-based robust digital image watermarking scheme
  publication-title: IEEE Trans. Signal Process
– start-page: 128
  year: 2002
  end-page: 142
  ident: bib0240
  publication-title: An affine invariant interest point detector
– start-page: 3
  year: 2006
  end-page: 23
  ident: bib0245
  article-title: Airborne high-resolution digital imaging system
  publication-title: Journal of Applied Research and Technology
– volume: 177
  start-page: 377
  year: 2006
  end-page: 386
  ident: bib0205
  article-title: Feature based watermarking using watermark template match
  publication-title: Appl. Math Comput.
– volume: 10
  start-page: 650
  year: 2001
  end-page: 658
  ident: bib0320
  article-title: Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution
  publication-title: IEEE Trans. Image Processing
– volume: 45
  start-page: 1
  year: 2006
  end-page: 11
  ident: bib0165
  article-title: Robust image watermarking using local invariant features
  publication-title: Opt. Eng.
– reference: , 2006
– volume: 7
  start-page: 326
  year: 1998
  end-page: 332
  ident: bib0155
  article-title: Digital watermarking of color images using amplitude modulation
  publication-title: J. Electron. Imag.
– volume: 1
  start-page: 320
  year: 1999
  end-page: 323
  ident: bib0150
  article-title: Toward second generation watermarking schemes
  publication-title: Proceedings of the IEEE International Conference Image Processing
– reference: Cayre F., Fontaine C. and Furon T., 2005. Watermarking security, part I: theory, In: Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE. 5681.
– volume: 6
  start-page: 587
  year: 1998
  end-page: 593
  ident: bib0065
  article-title: Some general methods for tampering with watermarks
  publication-title: IEEE J. Selected Areas Communi.
– volume: 2350
  start-page: 128
  year: 2002
  end-page: 142
  ident: bib0230
  article-title: An affine invariant interest point detector
  publication-title: Proceedings of European Conference on Computer Vision
– volume: 39
  start-page: 118
  year: 2001
  end-page: 126
  ident: bib0355
  article-title: Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks
  publication-title: IEEE Communications Magazine
– volume: 3022
  start-page: 310
  year: 1997
  end-page: 321
  ident: bib0095
  article-title: Can invisible watermark resolve rightful ownerships
  publication-title: Fifth Conference on Storage and Retrieval for Image and Video Database
– year: 2000
  ident: bib0315
  article-title: Self-similar ring shaped watermark embedding in 2-D DFT domain
– volume: 12
  start-page: 68
  year: 2005
  end-page: 78
  ident: bib0185
  article-title: Geometric attacks on image watermarking systems
  publication-title: IEEE Multimedia Magazine
– start-page: 134
  year: 1999
  end-page: 146
  ident: bib0130
  publication-title: Watermark estimation through local pixel correlation
– volume: 4
  year: 2010
  ident: bib0295
  article-title: Airborne high-resolution digital imaging system
  publication-title: Journal of Applied Research and Technology
– reference: Petitcolas F., 1999.
– volume: 1
  year: 2009
  ident: bib0335
  article-title: Images acquisition of multiphase dispersions in fermentation processes
  publication-title: Journal of Applied Research and Technology
– volume: 49
  start-page: 563
  year: 1999
  end-page: 593
  ident: bib0250
  article-title: Information-theoretic analysis of information hiding
  publication-title: IEEE Inform. Theory, preprint
– volume: 12
  start-page: 158
  year: 2005
  end-page: 161
  ident: bib0030
  article-title: Effectiveness of exhaustive search and template matching against watermark desynchronization
  publication-title: IEEE Signal Process. Lett.
– volume: 5
  start-page: 203
  year: 2003
  end-page: 214
  ident: bib0180
  article-title: Exhaustive geometrical search and the false positive watermark detection probability
  publication-title: Proc. SPIE Security and Watermarking of Multimedia Contents
– volume: 9
  start-page: 1123
  year: 2000
  end-page: 1129
  ident: bib0380
  article-title: Robust template matching for affine resistant image watermarks
  publication-title: IEEE Trans. Image Processing
– volume: 37
  start-page: 1365
  year: 2004
  end-page: 1375
  ident: bib0305
  article-title: Localized image watermarking based on feature points of scale-space representation
  publication-title: Pattern Recognition
– volume: 6
  start-page: 1673
  year: 1997
  end-page: 1678
  ident: bib0090
  article-title: Secure spread spectrum watermarking for multimedia
  publication-title: IEEE Transactions on Image Processing
– year: 2002
  ident: bib0235
  publication-title: Interest point detection invariant to affine transformations
– volume: 10
  year: 2012
  ident: bib0120
  article-title: Robust MPEG Watermarking in DWT Four Bands
  publication-title: Journal of Applied Research and Technology
– volume: 15
  start-page: 96
  year: 2005
  end-page: 102
  ident: bib0170
  article-title: Image adaptive watermarking using wavelet domain singular value decomposition
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 2
  start-page: 209
  year: 2000
  end-page: 224
  ident: bib0200
  article-title: Cocktail watermarking for digital image protection
  publication-title: IEEE Trans. Multimedia
– volume: 89
  start-page: 1531
  year: 2009
  end-page: 1539
  ident: bib0110
  article-title: A local Tchebichef moments-based robust image watermarking
  publication-title: Signal Process
– volume: 53
  start-page: 806
  year: 2005
  end-page: 815
  ident: bib0340
  article-title: Multiple watermarks for stereo audio signals using phase-modulation techniques
  publication-title: IEEE Transactions on Signal Processing
– volume: 2
  start-page: 72
  year: 2000
  end-page: 79
  ident: bib0105
  article-title: Generalized 2D Cyclic Patterns for Secret Watermark Generation
  publication-title: Proc. IEEE Int'l Conf. Image Processing
– volume: 39
  start-page: 1
  year: 2007
  end-page: 91
  ident: bib0375
  article-title: A survey of RST invariant image watermarking algorithms
  publication-title: ACM Comput. Surv.
– volume: 87
  start-page: 1062
  year: 1999
  end-page: 1078
  ident: bib0285
  article-title: Information Hiding: A survey
  publication-title: Proceedings of the IEEE (special issue)
– volume: 2
  start-page: 236
  year: 1999
  end-page: 239
  ident: bib0060
  article-title: Robust watermarking by histogram specification
  publication-title: Proc. IEEE Int. Conf. Image Processing
– year: 2001
  ident: bib0070
  publication-title: Digital Watermarking
– year: 1996
  ident: bib0290
  publication-title: A method for signature casting on digital images
– start-page: 2632
  year: 2006
  end-page: 2635
  ident: bib0370
  article-title: Image content- based watermarking resistant against geometrical distortions
– year: 1998
  ident: bib0160
  publication-title: Removing spatial spread spectrum watermarks by non-linear filtering
– volume: 10
  year: 2012
  ident: bib0360
  article-title: Optimal Workflow Scheduling in Critical Infrastructure Systems with Neural Networks
  publication-title: Journal of Applied Research and Technology
– year: 2006
  ident: bib0025
  publication-title: Profiles for Evaluation - the Usage of Audio WET
– reference: Checkmark Benchmarking,
– year: 1997
  ident: bib0260
  publication-title: A copyright protection environment for digital images
– start-page: 201
  year: 2001
  end-page: 206
  ident: bib0135
  publication-title: Considerations on watermarking security
– volume: 10
  start-page: 405
  year: 2012
  end-page: 415
  ident: bib0395
  article-title: An Improved Robust and Adaptive Watermarking Algorithm Based on DCT
  publication-title: Journal Of Applied Research And Technology
– start-page: 234
  year: 1996
  end-page: 246
  ident: bib0085
  publication-title: Secure spread spectrum watermarking for images, audio and video
– volume: 63
  start-page: 123
  year: 2007
  end-page: 131
  ident: bib0175
  article-title: Localized image watermarking in spatial domain resistant to geometric attacks, Int
  publication-title: J. Electron. Commun. (AEU)
– start-page: 215
  year: 1996
  end-page: 218
  ident: bib0390
  article-title: A method for signature casting on digital images
– volume: 3971
  start-page: 82
  year: 2000
  end-page: 89
  ident: bib0005
  article-title: Geometric distortion correction in image watermarking
  publication-title: Proc. SPIE Security and Watermarking of Multimedia Contents II
– start-page: 142
  year: 2007
  end-page: 143
  ident: bib0075
  publication-title: Digital Watermarking and Steganography
– volume: 11
  start-page: 1014
  year: 2002
  end-page: 1028
  ident: bib0035
  article-title: Geometrically invariant watermarking using feature point
  publication-title: IEEE Transactions on Image Processing
– reference: StirMark Benchmark,
– year: 2006
  ident: bib0055
  publication-title: Transparency benchmarking on audio watermarks and steganography
– volume: 4
  start-page: 2985
  year: 1996
  end-page: 2988
  ident: bib0350
  article-title: Adaptive watermarking in the DCT domain
  publication-title: Proc. Int. Conf. Image Processing
– volume: 3
  start-page: 489
  year: 2002
  end-page: 492
  ident: bib0115
  article-title: Affine transformation resistant watermarking based on image normalization
  publication-title: Proceedings of International Conference on Image Processing
– start-page: 394
  year: 2001
  end-page: 405
  ident: bib0125
  publication-title: The watermark template attack
– volume: 11
  start-page: 259
  year: 2013
  end-page: 271
  ident: bib0415
  article-title: A Blind Data Hiding Technique with Error Correction Abilities and a High Embedding Payload
  publication-title: Journal of Applied Research and Technology
– start-page: 219
  year: 1998
  end-page: 239
  ident: bib0270
  article-title: Attacks on copyright marking systems
  publication-title: Second International Information Hiding Workshop
– volume: 11
  start-page: 764
  year: 2013
  end-page: 779
  ident: bib0410
  article-title: Cropping Resilient Watermarking Based on Histogram Modification
  publication-title: Journal of Applied Research and Technology
– volume: 8
  start-page: 29
  year: 1989
  end-page: 42
  ident: bib0220
  article-title: One the derivation of a chaotic encryption algorithm
  publication-title: Cryptologia
– volume: 4314
  start-page: 575
  year: 2001
  end-page: 584
  ident: bib0280
  article-title: Public automated web-based evaluation service for watermarking schemes: StirMark Benchmark
  publication-title: Security and Watermarking of Multimedia Contents III, Proceedings of SPIE
– year: 1999
  ident: bib0330
  publication-title: Power-spectrun condition for energy-efficient watermarking, IEEE ICIP-99
– volume: 54
  start-page: 1537
  year: 2006
  end-page: 1549
  ident: bib0310
  article-title: Image watermarking based on invariant regions of scale-space representation, IEEE Trans
  publication-title: Signal Process
– volume: 15
  start-page: 459
  year: 2006
  end-page: 472
  ident: bib0015
  article-title: Progressive quantized projection approach to data hiding
  publication-title: IEEE Transactions on Image Processing
– year: 1997
  ident: bib0080
  publication-title: A review of watermarking and the importance of perceptual modeling
– year: 2005
  ident: bib0225
  publication-title: An information-theoretic view ofwatermark embedding-detection and geometric attacks
– volume: 9
  start-page: 1123
  year: 2000
  end-page: 1129
  ident: bib0255
  article-title: Robust template matching for affine resistant image watermarks
  publication-title: IEEE Trans. Image Processing
– volume: 17
  start-page: 611
  year: 2002
  end-page: 633
  ident: bib0020
  article-title: Analysis of pilot- based synchronization algorithms for watermarking of still images
  publication-title: Signal Processing: Image Communication
– volume: 92
  start-page: 971
  year: 2004
  end-page: 984
  ident: bib0215
  article-title: Benchmarking of Image Watermarking Algorithms for Digital Rights Management
  publication-title: Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management
– reference: Cayre F., Fontaine C. and Furon T., 2005. Watermarking security, part II: practice, In: Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE. 5681.
– volume: 3
  start-page: 1291
  year: 2000
  end-page: 1294
  ident: bib0010
  article-title: Geometric distortion correction through image normalization
  publication-title: Proc. IEEE Int. Conf. Multimedia and Expo
– volume: 2
  start-page: 375
  year: 2004
  end-page: 377
  ident: bib0140
  article-title: An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark
  publication-title: IEEE Signal Processing Tellers
– start-page: 1270
  year: 2006
  end-page: 1273
  ident: bib0365
  article-title: A robust blind image watermarking scheme based on feature points and RS- invariant domain
– start-page: 153
  year: 1992
  end-page: 159
  ident: bib0385
  article-title: A cautionary note on image downgrading
– volume: 66
  start-page: 303
  year: 1998
  end-page: 317
  ident: bib0300
  article-title: Rotation, scale and translation invariant digital image watermarking
  publication-title: Signal Process
– volume: 87
  start-page: 1062
  year: 1999
  end-page: 1078
  ident: bib0275
  article-title: Information hiding—A survey
  publication-title: Proceedings of the IEEE, special issue on protection of multimedia content
– start-page: 131
  year: 2005
  end-page: 145
  ident: bib0210
  article-title: Information-Theoretic Analysis of Security in Side-Informed Data Hiding
  publication-title: Information Hiding
– year: 2000
  ident: bib0100
  publication-title: Countermeasures for unintentional and intentional video watermarking attacks
– volume: 8
  start-page: 323
  year: 2010
  end-page: 337
  ident: bib0400
  article-title: A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression
  publication-title: Journal of applied research and technology
– volume: 10
  year: 2012
  ident: bib0405
  article-title: Robust MPEG Watermarking in DWT Four Bands
  publication-title: Journal of Applied Research and Technology
– volume: 3528
  start-page: 423
  year: 1999
  end-page: 431
  ident: bib0145
  article-title: Watermarking Resisting to Translation, Rotation, and Scaling
  publication-title: Proc. SPIE Multimedia Systems and Applications
– volume: 3971
  start-page: 90
  year: 2000
  end-page: 98
  ident: bib0190
  article-title: Rotation, scale, and translation- resilient public watermarking for images
  publication-title: Proc. SPIE— Security and Watermarking of Multimedia Contents II
– volume: 177
  start-page: 377
  issue: 1
  year: 2006
  ident: 10.1016/S1665-6423(14)71612-8_bib0205
  article-title: Feature based watermarking using watermark template match
  publication-title: Appl. Math Comput.
  doi: 10.1016/j.amc.2005.11.015
– volume: 39
  start-page: 118
  issue: 8
  year: 2001
  ident: 10.1016/S1665-6423(14)71612-8_bib0355
  article-title: Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks
  publication-title: IEEE Communications Magazine
  doi: 10.1109/35.940053
– start-page: 394
  year: 2001
  ident: 10.1016/S1665-6423(14)71612-8_bib0125
– volume: 8
  start-page: 323
  issue: 3
  year: 2010
  ident: 10.1016/S1665-6423(14)71612-8_bib0400
  article-title: A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression
  publication-title: Journal of applied research and technology
  doi: 10.22201/icat.16656423.2010.8.03.454
– volume: 49
  start-page: 563
  issue: 3
  year: 1999
  ident: 10.1016/S1665-6423(14)71612-8_bib0250
  article-title: Information-theoretic analysis of information hiding
  publication-title: IEEE Inform. Theory, preprint
  doi: 10.1109/TIT.2002.808134
– volume: 6
  start-page: 1673
  issue: 12
  year: 1997
  ident: 10.1016/S1665-6423(14)71612-8_bib0090
  article-title: Secure spread spectrum watermarking for multimedia
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/83.650120
– volume: 2350
  start-page: 128
  year: 2002
  ident: 10.1016/S1665-6423(14)71612-8_bib0230
  article-title: An affine invariant interest point detector
  publication-title: Proceedings of European Conference on Computer Vision
– year: 1997
  ident: 10.1016/S1665-6423(14)71612-8_bib0080
– volume: 2
  start-page: 375
  year: 2004
  ident: 10.1016/S1665-6423(14)71612-8_bib0140
  article-title: An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark
  publication-title: IEEE Signal Processing Tellers
  doi: 10.1109/LSP.2003.822923
– year: 1996
  ident: 10.1016/S1665-6423(14)71612-8_bib0290
– year: 1998
  ident: 10.1016/S1665-6423(14)71612-8_bib0160
– volume: 10
  start-page: 405
  issue: 3
  year: 2012
  ident: 10.1016/S1665-6423(14)71612-8_bib0395
  article-title: An Improved Robust and Adaptive Watermarking Algorithm Based on DCT
  publication-title: Journal Of Applied Research And Technology
  doi: 10.22201/icat.16656423.2012.10.3.397
– volume: 8
  start-page: 29
  issue: 1
  year: 1989
  ident: 10.1016/S1665-6423(14)71612-8_bib0220
  article-title: One the derivation of a chaotic encryption algorithm
  publication-title: Cryptologia
  doi: 10.1080/0161-118991863745
– volume: 2
  start-page: 209
  issue: 4
  year: 2000
  ident: 10.1016/S1665-6423(14)71612-8_bib0200
  article-title: Cocktail watermarking for digital image protection
  publication-title: IEEE Trans. Multimedia
  doi: 10.1109/6046.890056
– volume: 39
  start-page: 1
  issue: 2
  year: 2007
  ident: 10.1016/S1665-6423(14)71612-8_bib0375
  article-title: A survey of RST invariant image watermarking algorithms
  publication-title: ACM Comput. Surv.
  doi: 10.1145/1242471.1242473
– year: 2002
  ident: 10.1016/S1665-6423(14)71612-8_bib0235
– volume: 3022
  start-page: 310
  year: 1997
  ident: 10.1016/S1665-6423(14)71612-8_bib0095
  article-title: Can invisible watermark resolve rightful ownerships
  publication-title: Fifth Conference on Storage and Retrieval for Image and Video Database
  doi: 10.1117/12.263419
– start-page: 234
  year: 1996
  ident: 10.1016/S1665-6423(14)71612-8_bib0085
– start-page: 201
  year: 2001
  ident: 10.1016/S1665-6423(14)71612-8_bib0135
– start-page: 215
  year: 1996
  ident: 10.1016/S1665-6423(14)71612-8_bib0390
  article-title: A method for signature casting on digital images
– year: 2001
  ident: 10.1016/S1665-6423(14)71612-8_bib0070
– ident: 10.1016/S1665-6423(14)71612-8_bib0040
  doi: 10.1117/12.586876
– year: 2000
  ident: 10.1016/S1665-6423(14)71612-8_bib0100
– volume: 4
  start-page: 2985
  year: 1996
  ident: 10.1016/S1665-6423(14)71612-8_bib0350
  article-title: Adaptive watermarking in the DCT domain
  publication-title: Proc. Int. Conf. Image Processing
– volume: 45
  start-page: 1
  issue: 3
  year: 2006
  ident: 10.1016/S1665-6423(14)71612-8_bib0165
  article-title: Robust image watermarking using local invariant features
  publication-title: Opt. Eng.
– volume: 89
  start-page: 1531
  issue: 8
  year: 2009
  ident: 10.1016/S1665-6423(14)71612-8_bib0110
  article-title: A local Tchebichef moments-based robust image watermarking
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2009.02.005
– start-page: 153
  year: 1992
  ident: 10.1016/S1665-6423(14)71612-8_bib0385
  article-title: A cautionary note on image downgrading
– volume: 10
  issue: 2
  year: 2012
  ident: 10.1016/S1665-6423(14)71612-8_bib0360
  article-title: Optimal Workflow Scheduling in Critical Infrastructure Systems with Neural Networks
  publication-title: Journal of Applied Research and Technology
  doi: 10.22201/icat.16656423.2012.10.2.398
– volume: 1
  start-page: 320
  year: 1999
  ident: 10.1016/S1665-6423(14)71612-8_bib0150
  article-title: Toward second generation watermarking schemes
  publication-title: Proceedings of the IEEE International Conference Image Processing
– volume: 12
  start-page: 68
  issue: 3
  year: 2005
  ident: 10.1016/S1665-6423(14)71612-8_bib0185
  article-title: Geometric attacks on image watermarking systems
  publication-title: IEEE Multimedia Magazine
  doi: 10.1109/MMUL.2005.46
– volume: 11
  start-page: 259
  year: 2013
  ident: 10.1016/S1665-6423(14)71612-8_bib0415
  article-title: A Blind Data Hiding Technique with Error Correction Abilities and a High Embedding Payload
  publication-title: Journal of Applied Research and Technology
  doi: 10.1016/S1665-6423(13)71536-0
– year: 2006
  ident: 10.1016/S1665-6423(14)71612-8_bib0025
– volume: 37
  start-page: 1365
  issue: 7
  year: 2004
  ident: 10.1016/S1665-6423(14)71612-8_bib0305
  article-title: Localized image watermarking based on feature points of scale-space representation
  publication-title: Pattern Recognition
  doi: 10.1016/j.patcog.2003.12.013
– volume: 11
  start-page: 1014
  issue: 9
  year: 2002
  ident: 10.1016/S1665-6423(14)71612-8_bib0035
  article-title: Geometrically invariant watermarking using feature point
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/TIP.2002.801587
– volume: 12
  start-page: 158
  issue: 2
  year: 2005
  ident: 10.1016/S1665-6423(14)71612-8_bib0030
  article-title: Effectiveness of exhaustive search and template matching against watermark desynchronization
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2004.840872
– volume: 66
  start-page: 303
  issue: 3
  year: 1998
  ident: 10.1016/S1665-6423(14)71612-8_bib0300
  article-title: Rotation, scale and translation invariant digital image watermarking
  publication-title: Signal Process
  doi: 10.1016/S0165-1684(98)00012-7
– volume: 3971
  start-page: 82
  year: 2000
  ident: 10.1016/S1665-6423(14)71612-8_bib0005
  article-title: Geometric distortion correction in image watermarking
  publication-title: Proc. SPIE Security and Watermarking of Multimedia Contents II
  doi: 10.1117/12.385011
– volume: 51
  start-page: 950
  issue: 4
  year: 2003
  ident: 10.1016/S1665-6423(14)71612-8_bib0345
  article-title: A feature-based robust digital image watermarking scheme
  publication-title: IEEE Trans. Signal Process
  doi: 10.1109/TSP.2003.809367
– volume: 1
  issue: 01
  year: 2009
  ident: 10.1016/S1665-6423(14)71612-8_bib0335
  article-title: Images acquisition of multiphase dispersions in fermentation processes
  publication-title: Journal of Applied Research and Technology
  doi: 10.22201/icat.16656423.2003.1.01.613
– volume: 10
  issue: 2
  year: 2012
  ident: 10.1016/S1665-6423(14)71612-8_bib0405
  article-title: Robust MPEG Watermarking in DWT Four Bands
  publication-title: Journal of Applied Research and Technology
– volume: 10
  start-page: 650
  year: 2001
  ident: 10.1016/S1665-6423(14)71612-8_bib0320
  article-title: Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution
  publication-title: IEEE Trans. Image Processing
  doi: 10.1109/83.913599
– start-page: 128
  year: 2002
  ident: 10.1016/S1665-6423(14)71612-8_bib0240
– start-page: 219
  year: 1998
  ident: 10.1016/S1665-6423(14)71612-8_bib0270
  article-title: Attacks on copyright marking systems
  publication-title: Second International Information Hiding Workshop
– volume: 10
  issue: 2
  year: 2012
  ident: 10.1016/S1665-6423(14)71612-8_bib0120
  article-title: Robust MPEG Watermarking in DWT Four Bands
  publication-title: Journal of Applied Research and Technology
– volume: 2
  start-page: 236
  year: 1999
  ident: 10.1016/S1665-6423(14)71612-8_bib0060
  article-title: Robust watermarking by histogram specification
  publication-title: Proc. IEEE Int. Conf. Image Processing
– volume: 63
  start-page: 123
  year: 2007
  ident: 10.1016/S1665-6423(14)71612-8_bib0175
  article-title: Localized image watermarking in spatial domain resistant to geometric attacks, Int
  publication-title: J. Electron. Commun. (AEU)
  doi: 10.1016/j.aeue.2007.11.007
– volume: 3971
  start-page: 90
  year: 2000
  ident: 10.1016/S1665-6423(14)71612-8_bib0190
  article-title: Rotation, scale, and translation- resilient public watermarking for images
  publication-title: Proc. SPIE— Security and Watermarking of Multimedia Contents II
  doi: 10.1117/12.385012
– volume: 17
  start-page: 611
  issue: 8
  year: 2002
  ident: 10.1016/S1665-6423(14)71612-8_bib0020
  article-title: Analysis of pilot- based synchronization algorithms for watermarking of still images
  publication-title: Signal Processing: Image Communication
– start-page: 142
  year: 2007
  ident: 10.1016/S1665-6423(14)71612-8_bib0075
– volume: 15
  start-page: 459
  issue: 2
  year: 2006
  ident: 10.1016/S1665-6423(14)71612-8_bib0015
  article-title: Progressive quantized projection approach to data hiding
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/TIP.2005.860318
– ident: 10.1016/S1665-6423(14)71612-8_bib0045
  doi: 10.1117/12.586890
– volume: 54
  start-page: 1537
  issue: 4
  year: 2006
  ident: 10.1016/S1665-6423(14)71612-8_bib0310
  article-title: Image watermarking based on invariant regions of scale-space representation, IEEE Trans
  publication-title: Signal Process
– volume: 92
  start-page: 971
  issue: 6
  year: 2004
  ident: 10.1016/S1665-6423(14)71612-8_bib0215
  article-title: Benchmarking of Image Watermarking Algorithms for Digital Rights Management
  publication-title: Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management
– start-page: 1270
  year: 2006
  ident: 10.1016/S1665-6423(14)71612-8_bib0365
  article-title: A robust blind image watermarking scheme based on feature points and RS- invariant domain
– year: 1999
  ident: 10.1016/S1665-6423(14)71612-8_bib0330
– start-page: 131
  year: 2005
  ident: 10.1016/S1665-6423(14)71612-8_bib0210
  article-title: Information-Theoretic Analysis of Security in Side-Informed Data Hiding
  publication-title: Information Hiding
– ident: 10.1016/S1665-6423(14)71612-8_bib0325
– volume: 3528
  start-page: 423
  year: 1999
  ident: 10.1016/S1665-6423(14)71612-8_bib0145
  article-title: Watermarking Resisting to Translation, Rotation, and Scaling
  publication-title: Proc. SPIE Multimedia Systems and Applications
  doi: 10.1117/12.337432
– volume: 53
  start-page: 806
  year: 2005
  ident: 10.1016/S1665-6423(14)71612-8_bib0340
  article-title: Multiple watermarks for stereo audio signals using phase-modulation techniques
  publication-title: IEEE Transactions on Signal Processing
  doi: 10.1109/TSP.2004.839901
– volume: 7
  start-page: 326
  issue: 2
  year: 1998
  ident: 10.1016/S1665-6423(14)71612-8_bib0155
  article-title: Digital watermarking of color images using amplitude modulation
  publication-title: J. Electron. Imag.
  doi: 10.1117/1.482648
– volume: 14
  start-page: 369
  issue: 5
  year: 1993
  ident: 10.1016/S1665-6423(14)71612-8_bib0195
  article-title: Towards absolute invariants of images under translation, rotation and dilatation
  publication-title: Pattern Recognit. Lett.
  doi: 10.1016/0167-8655(93)90114-S
– volume: 9
  start-page: 1123
  year: 2000
  ident: 10.1016/S1665-6423(14)71612-8_bib0255
  article-title: Robust template matching for affine resistant image watermarks
  publication-title: IEEE Trans. Image Processing
  doi: 10.1109/83.846253
– year: 2005
  ident: 10.1016/S1665-6423(14)71612-8_bib0225
– start-page: 2632
  year: 2006
  ident: 10.1016/S1665-6423(14)71612-8_bib0370
  article-title: Image content- based watermarking resistant against geometrical distortions
– volume: 11
  start-page: 764
  year: 2013
  ident: 10.1016/S1665-6423(14)71612-8_bib0410
  article-title: Cropping Resilient Watermarking Based on Histogram Modification
  publication-title: Journal of Applied Research and Technology
  doi: 10.1016/S1665-6423(13)71584-0
– volume: 87
  start-page: 1062
  issue: 7
  year: 1999
  ident: 10.1016/S1665-6423(14)71612-8_bib0285
  article-title: Information Hiding: A survey
  publication-title: Proceedings of the IEEE (special issue)
  doi: 10.1109/5.771065
– ident: 10.1016/S1665-6423(14)71612-8_bib0050
– volume: 6
  start-page: 587
  issue: 4
  year: 1998
  ident: 10.1016/S1665-6423(14)71612-8_bib0065
  article-title: Some general methods for tampering with watermarks
  publication-title: IEEE J. Selected Areas Communi.
  doi: 10.1109/49.668980
– volume: 5
  start-page: 203
  issue: 2
  year: 2003
  ident: 10.1016/S1665-6423(14)71612-8_bib0180
  article-title: Exhaustive geometrical search and the false positive watermark detection probability
  publication-title: Proc. SPIE Security and Watermarking of Multimedia Contents
  doi: 10.1117/12.503186
– volume: 87
  start-page: 1062
  issue: 7
  year: 1999
  ident: 10.1016/S1665-6423(14)71612-8_bib0275
  article-title: Information hiding—A survey
  publication-title: Proceedings of the IEEE, special issue on protection of multimedia content
– volume: 4314
  start-page: 575
  year: 2001
  ident: 10.1016/S1665-6423(14)71612-8_bib0280
  article-title: Public automated web-based evaluation service for watermarking schemes: StirMark Benchmark
  publication-title: Security and Watermarking of Multimedia Contents III, Proceedings of SPIE
  doi: 10.1117/12.435442
– year: 1997
  ident: 10.1016/S1665-6423(14)71612-8_bib0260
– volume: 2
  start-page: 72
  year: 2000
  ident: 10.1016/S1665-6423(14)71612-8_bib0105
  article-title: Generalized 2D Cyclic Patterns for Secret Watermark Generation
  publication-title: Proc. IEEE Int'l Conf. Image Processing
– volume: 9
  start-page: 1123
  year: 2000
  ident: 10.1016/S1665-6423(14)71612-8_bib0380
  article-title: Robust template matching for affine resistant image watermarks
  publication-title: IEEE Trans. Image Processing
  doi: 10.1109/83.846253
– volume: 4
  issue: 01
  year: 2010
  ident: 10.1016/S1665-6423(14)71612-8_bib0295
  article-title: Airborne high-resolution digital imaging system
  publication-title: Journal of Applied Research and Technology
– year: 2000
  ident: 10.1016/S1665-6423(14)71612-8_bib0315
  article-title: Self-similar ring shaped watermark embedding in 2-D DFT domain
– volume: 15
  start-page: 96
  issue: 1
  year: 2005
  ident: 10.1016/S1665-6423(14)71612-8_bib0170
  article-title: Image adaptive watermarking using wavelet domain singular value decomposition
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2004.836745
– start-page: 134
  year: 1999
  ident: 10.1016/S1665-6423(14)71612-8_bib0130
– ident: 10.1016/S1665-6423(14)71612-8_bib0265
– volume: 3
  start-page: 489
  year: 2002
  ident: 10.1016/S1665-6423(14)71612-8_bib0115
  article-title: Affine transformation resistant watermarking based on image normalization
  publication-title: Proceedings of International Conference on Image Processing
  doi: 10.1109/ICIP.2002.1039014
– volume: 3
  start-page: 1291
  year: 2000
  ident: 10.1016/S1665-6423(14)71612-8_bib0010
  article-title: Geometric distortion correction through image normalization
  publication-title: Proc. IEEE Int. Conf. Multimedia and Expo
  doi: 10.1109/ICME.2000.871003
– year: 2006
  ident: 10.1016/S1665-6423(14)71612-8_bib0055
– start-page: 3
  issue: 001
  year: 2006
  ident: 10.1016/S1665-6423(14)71612-8_bib0245
  article-title: Airborne high-resolution digital imaging system
  publication-title: Journal of Applied Research and Technology
SSID ssj0068840
Score 2.3601305
Snippet Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 122
SubjectTerms attacks
robust
security
watermarking
Title Robust Image Watermarking Theories and Techniques: A Review
URI https://dx.doi.org/10.1016/S1665-6423(14)71612-8
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaW9gIHBC2I0hb5UCTQykseThyX0wpRbQutBGxFxSWyHbdFYrNVN7301zN-xEnZqlAu0corT6LMZPx5Hp8R2hFVKhhTkmiqGaG5UKTQuSKwWgAaOWVaWCamw6N8ckwPTrKTweC6313SyJG6vrWv5H-0CmOgV9Mlew_NBqEwAL9Bv3AFDcP1n3T8dS6vFs1wf2YKb74L62Vt7Nu13MMm2OYGpi1P68L1offyAcuwVHhY6lmAXONbsxSAnwobY52In12BwLw-mzlKgs9h9HB-LmaiGv4Q_tgvsajDn2NZmTi-9U_nsCwPj0b9KERM28Ll4DjzPCOwl0lveNZkyYKcm4xdL7JfcWPH77LkzF1c4VsQbZir6OvEkF7FCSm6FazN2v-xsIVyw1DJZkSVRhTseEorpiweoNWEMZvi__QlZKDyonDNtO3Nu-6vd90TvYnpW_80t-OaHlaZPkGPvTbx2FnMUzTQ9Rp61KOeXEfvne1gazu4bzu4tR0Mmsed7eziMXaW8wwd732cfpgQf5AGUTRJGsJ4RiuTIdWAj7Oogq8RMAlP80gYfkjFAHbCNjgSMi-o4DJTPOJpVImMVwD_4_Q5WqnntX6BsFIqZhXTpxy-ZhYxyYQCOZzLKJUJyzYQbV9DqTzLvDns5Fd5pxI20ChMu3A0K3-bULTvuPRY0WHAEqzn7qkv73uvTfSwM_kttNJcXultgKKNfGVt5jfvC3wB
linkProvider Colorado Alliance of Research Libraries
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Robust+Image+Watermarking+Theories+and+Techniques%3A+A+Review&rft.jtitle=Journal+of+applied+research+and+technology&rft.au=Tao%2C+Hai&rft.au=Chongmin%2C+Li&rft.au=Mohamad+Zain%2C+Jasni&rft.au=Abdalla%2C+Ahmed+N.&rft.date=2014-02-01&rft.issn=1665-6423&rft.volume=12&rft.issue=1&rft.spage=122&rft.epage=138&rft_id=info:doi/10.1016%2FS1665-6423%2814%2971612-8&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_S1665_6423_14_71612_8
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1665-6423&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1665-6423&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1665-6423&client=summon