Robust Image Watermarking Theories and Techniques: A Review
Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect the copyright of digital contents by storing, transmitting and processing information encoded in systems where digital content can easily be...
Saved in:
Published in | Journal of applied research and technology Vol. 12; no. 1; pp. 122 - 138 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier España, S.L.U
01.02.2014
|
Subjects | |
Online Access | Get full text |
ISSN | 1665-6423 |
DOI | 10.1016/S1665-6423(14)71612-8 |
Cover
Abstract | Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect the copyright of digital contents by storing, transmitting and processing information encoded in systems where digital content can easily be disseminated through communication channels? Today it is understood that the answer is yes. This paper reviews the theoretical analysis and performance investigation of representative watermarking systems in transform domains and geometric invariant regions. Digital watermarking is a technology of embedding watermark with intellectual property rights into images, videos, audios, and other multimedia data by a certain algorithm. The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. Moreover, it is concluded that various attacks operators are used for the assessment of watermarking systems, which supplies an automated and fair analysis of substantial watermarking methods for chosen application areas. |
---|---|
AbstractList | Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect the copyright of digital contents by storing, transmitting and processing information encoded in systems where digital content can easily be disseminated through communication channels? Today it is understood that the answer is yes. This paper reviews the theoretical analysis and performance investigation of representative watermarking systems in transform domains and geometric invariant regions. Digital watermarking is a technology of embedding watermark with intellectual property rights into images, videos, audios, and other multimedia data by a certain algorithm. The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. Moreover, it is concluded that various attacks operators are used for the assessment of watermarking systems, which supplies an automated and fair analysis of substantial watermarking methods for chosen application areas. |
Author | Abdalla, Ahmed N. Chongmin, Li Tao, Hai Mohamad Zain, Jasni |
Author_xml | – sequence: 1 givenname: Hai surname: Tao fullname: Tao, Hai organization: Faculty of Computer System and Software Engineering, University Malaysia Pahang, Malaysia – sequence: 2 givenname: Li surname: Chongmin fullname: Chongmin, Li organization: Department of mathematics and information, Qinghai Normal University, China – sequence: 3 givenname: Jasni surname: Mohamad Zain fullname: Mohamad Zain, Jasni organization: Faculty of Computer System and Software Engineering, University Malaysia Pahang, Malaysia – sequence: 4 givenname: Ahmed N. surname: Abdalla fullname: Abdalla, Ahmed N. organization: Faculty of Electrical and Electronic Engineering, University Malaysia Pahang, Malaysia |
BookMark | eNqFz81KAzEUhuEsKthWL0HIUhejyUySydiFlOJPoSDUEZchTU7baJvRJFW8e6etuHDT1YED7wdPD3V84wGhM0ouKaHi6okKwTPB8uKcsouSCppnsoO6f-9j1IvxlRAhJSNdNJg2s01MeLzWC8AvOkFY6_Dm_ALXS2iCg4i1t7gGs_TuYwPxGg_xFD4dfJ2go7leRTj9vX30fHdbjx6yyeP9eDScZIblecrKijPLGZfAOeXEShCspFUhiC4ZI6YUosh5RfRMSKarGTcVqQpiNa9s0aKKPhrsd01oYgwwV8YlnVzjU9BupShRW7va2dUWqShTO7uSbc3_1e_Btcbvg93NvoOW1nKDisaBN2BdAJOUbdyBhR-pwHLq |
CitedBy_id | crossref_primary_10_1088_1757_899X_872_1_012001 crossref_primary_10_1007_s11554_024_01559_w crossref_primary_10_1155_2018_6712065 crossref_primary_10_1007_s11042_016_3734_2 crossref_primary_10_3390_sym10030077 crossref_primary_10_3390_info11020110 crossref_primary_10_1007_s11042_022_12738_x crossref_primary_10_1007_s11042_024_20258_z crossref_primary_10_1016_j_jksuci_2021_07_012 crossref_primary_10_29252_jsdp_17_4_15 crossref_primary_10_1109_TCSVT_2023_3295895 crossref_primary_10_1016_j_sysarc_2020_101897 crossref_primary_10_1007_s11554_017_0674_7 crossref_primary_10_1007_s11042_018_5889_5 crossref_primary_10_1109_ACCESS_2020_3035428 crossref_primary_10_1007_s11042_021_11237_9 crossref_primary_10_1007_s11042_023_14618_4 crossref_primary_10_3390_electronics10141744 crossref_primary_10_3233_JIFS_202468 crossref_primary_10_1007_s11042_018_6975_4 crossref_primary_10_4018_IJSITA_2019100101 crossref_primary_10_1109_ACCESS_2017_2682109 crossref_primary_10_1186_s13677_023_00468_w crossref_primary_10_3390_math9151795 crossref_primary_10_32604_cmc_2023_036317 crossref_primary_10_1007_s00500_019_04297_5 crossref_primary_10_1155_2022_5271600 crossref_primary_10_1007_s11042_018_5881_0 crossref_primary_10_1007_s11042_018_7085_z crossref_primary_10_1038_s41598_024_67074_x crossref_primary_10_1007_s41060_025_00723_0 crossref_primary_10_1007_s11042_018_5814_y crossref_primary_10_1007_s11042_020_08881_y crossref_primary_10_1007_s11771_022_4941_9 crossref_primary_10_1016_j_apenergy_2024_123545 crossref_primary_10_1007_s13369_017_2531_1 crossref_primary_10_1002_spy2_196 crossref_primary_10_1016_j_image_2020_116019 crossref_primary_10_69974_glskalp_01_01_49 crossref_primary_10_1177_0142331216640868 crossref_primary_10_1007_s11042_016_3485_0 crossref_primary_10_1016_j_compeleceng_2018_03_007 crossref_primary_10_3390_app14010435 crossref_primary_10_3390_e25070963 crossref_primary_10_1007_s11042_023_16459_7 crossref_primary_10_1016_j_bspc_2024_106557 crossref_primary_10_1007_s11071_018_4295_x crossref_primary_10_1631_FITEE_1500165 crossref_primary_10_1088_1742_6596_1918_4_042014 crossref_primary_10_1007_s11042_021_11798_9 crossref_primary_10_1007_s00371_023_03028_0 crossref_primary_10_1007_s00371_024_03271_z crossref_primary_10_1117_1_JEI_31_4_043043 crossref_primary_10_32604_cmc_2024_046305 crossref_primary_10_3390_s21165540 crossref_primary_10_3390_app15010057 crossref_primary_10_1007_s11042_023_15324_x crossref_primary_10_3390_sym12030486 crossref_primary_10_1007_s11042_023_15554_z crossref_primary_10_1007_s00034_023_02491_3 crossref_primary_10_1016_j_ijleo_2022_169280 crossref_primary_10_1007_s11082_019_2130_3 crossref_primary_10_1109_ACCESS_2018_2808172 crossref_primary_10_32604_cmc_2024_055150 crossref_primary_10_1155_2023_5060564 crossref_primary_10_1016_j_jisa_2018_12_002 crossref_primary_10_3390_fi9030045 crossref_primary_10_1002_spy2_216 crossref_primary_10_1145_3701558 crossref_primary_10_1007_s13369_019_03883_x crossref_primary_10_1109_ACCESS_2024_3374201 crossref_primary_10_1016_j_jisa_2022_103414 crossref_primary_10_21122_2309_4923_2020_2_72_76 crossref_primary_10_1016_j_asoc_2023_110271 crossref_primary_10_1007_s11220_019_0270_y crossref_primary_10_1007_s10044_017_0613_z crossref_primary_10_1007_s12652_022_03771_7 crossref_primary_10_1007_s11042_019_08423_1 crossref_primary_10_1049_iet_ifs_2019_0601 crossref_primary_10_1007_s11760_024_03182_5 crossref_primary_10_1007_s11554_020_00941_8 crossref_primary_10_21205_deufmd_2021236816 crossref_primary_10_1016_j_ins_2024_121521 crossref_primary_10_1080_02522667_2017_1372153 crossref_primary_10_1007_s11042_024_18982_7 crossref_primary_10_17671_gazibtd_338753 crossref_primary_10_1007_s12530_021_09369_2 crossref_primary_10_1016_j_jksuci_2023_101698 crossref_primary_10_3390_a17010032 crossref_primary_10_1109_TCSVT_2022_3224243 |
Cites_doi | 10.1016/j.amc.2005.11.015 10.1109/35.940053 10.22201/icat.16656423.2010.8.03.454 10.1109/TIT.2002.808134 10.1109/83.650120 10.1109/LSP.2003.822923 10.22201/icat.16656423.2012.10.3.397 10.1080/0161-118991863745 10.1109/6046.890056 10.1145/1242471.1242473 10.1117/12.263419 10.1117/12.586876 10.1016/j.sigpro.2009.02.005 10.22201/icat.16656423.2012.10.2.398 10.1109/MMUL.2005.46 10.1016/S1665-6423(13)71536-0 10.1016/j.patcog.2003.12.013 10.1109/TIP.2002.801587 10.1109/LSP.2004.840872 10.1016/S0165-1684(98)00012-7 10.1117/12.385011 10.1109/TSP.2003.809367 10.22201/icat.16656423.2003.1.01.613 10.1109/83.913599 10.1016/j.aeue.2007.11.007 10.1117/12.385012 10.1109/TIP.2005.860318 10.1117/12.586890 10.1117/12.337432 10.1109/TSP.2004.839901 10.1117/1.482648 10.1016/0167-8655(93)90114-S 10.1109/83.846253 10.1016/S1665-6423(13)71584-0 10.1109/5.771065 10.1109/49.668980 10.1117/12.503186 10.1117/12.435442 10.1109/TCSVT.2004.836745 10.1109/ICIP.2002.1039014 10.1109/ICME.2000.871003 |
ContentType | Journal Article |
Copyright | 2014 Universidad Nacional Autónoma de México |
Copyright_xml | – notice: 2014 Universidad Nacional Autónoma de México |
DBID | 6I. AAFTH AAYXX CITATION |
DOI | 10.1016/S1665-6423(14)71612-8 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EndPage | 138 |
ExternalDocumentID | 10_1016_S1665_6423_14_71612_8 S1665642314716128 |
GroupedDBID | 0R~ 0SF 2WC 4.4 457 5GY 5VS 635 6I. AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAXUO ABMAC ADBBV ADCUG ADDVE ADEZE AEXQZ AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ APOWU AZFZN DU5 E3Z EBS EJD FDB GROUPED_DOAJ KQ8 KWQ M41 NCXOZ O9- OK1 RDY RNS ROL RSH SCD SSZ TR2 AAFWJ AAYWO AAYXX ACVFH ADCNI ADVLN AEUPX AFPUW AIGII AKBMS AKRWK AKYEP CITATION |
ID | FETCH-LOGICAL-c422t-7954d5458e55150d8e64719360a7440c76632590ab684a9b5c90930da59d31013 |
ISSN | 1665-6423 |
IngestDate | Tue Jul 01 01:34:44 EDT 2025 Thu Apr 24 23:12:40 EDT 2025 Tue May 16 23:59:34 EDT 2023 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | watermarking security robust attacks |
Language | English |
License | http://creativecommons.org/licenses/by-nc-nd/4.0 http://www.elsevier.com/tdm/userlicense/1.0 |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c422t-7954d5458e55150d8e64719360a7440c76632590ab684a9b5c90930da59d31013 |
OpenAccessLink | https://dx.doi.org/10.1016/S1665-6423(14)71612-8 |
PageCount | 17 |
ParticipantIDs | crossref_citationtrail_10_1016_S1665_6423_14_71612_8 crossref_primary_10_1016_S1665_6423_14_71612_8 elsevier_sciencedirect_doi_10_1016_S1665_6423_14_71612_8 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2014-02-01 |
PublicationDateYYYYMMDD | 2014-02-01 |
PublicationDate_xml | – month: 02 year: 2014 text: 2014-02-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | Journal of applied research and technology |
PublicationYear | 2014 |
Publisher | Elsevier España, S.L.U |
Publisher_xml | – name: Elsevier España, S.L.U |
References | Pitas (bib0290) 1996 Yuan, Ling, Lu, Yu (bib0370) 2006 Bas, Chassery, Macq (bib0035) 2002; 11 Lu, Lu, Chung (bib0205) 2006; 177 Tao, Dickinson (bib0350) 1996; 4 Deng, Gao, Li, Tao (bib0110) 2009; 89 Takahashi, Nishimura, Suzuki (bib0340) 2005; 53 Pereira, Pun (bib0255) 2000; 9 Elbaşı (bib0405) 2012; 10 Alghoniemy, Tewfik (bib0010) 2000; 3 in: Stirmark 3.0 (60). Cox, Linnartz (bib0065) 1998; 6 Licks, Jordan (bib0185) 2005; 12 Lu, Huang, Sze, Mark (bib0200) 2000; 2 Stankovic, Djurovic, Pitas (bib0320) 2001; 10 Su, Girod (bib0330) 1999 Cayre F., Fontaine C. and Furon T., 2005. Watermarking security, part I: theory, In: Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE. 5681. Cayre F., Fontaine C. and Furon T., 2005. Watermarking security, part II: practice, In: Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE. 5681. Cox, Miller (bib0080) 1997 Delannay, Macq (bib0105) 2000; 2 Kim, Choi, Lee, Kim (bib0140) 2004; 2 Christian, Jana, Andreas (bib0055) 2006 Kurak, McHugh (bib0385) 1992 Li, Guo (bib0175) 2007; 63 Kalker (bib0135) 2001 Bao, Ma (bib0170) 2005; 15 Macq, Dittmann, Delp (bib0215) 2004; 92 StirMark Benchmark Tang, Hang (bib0345) 2003; 51 Cox, Miller, Bloom, Fridrich, Kalker (bib0075) 2007 Petitcolas, Anderson, Kuhn (bib0285) 1999; 87 Deguillaume, Csurka, Pun (bib0100) 2000 Luis, Pedro, Fernando (bib0210) 2005 Taboada, Larralde, Brito, Vega-Alvarado, Diaz, Galindo, Corkidi (bib0335) 2009; 1 Alghoniemy, Tewfik (bib0015) 2006; 15 Moulin, O'sullivan (bib0250) 1999; 49 Petitcolas, Steinebach, Raynal, Dittmann, Fontaine, Fates (bib0280) 2001; 4314 Lee, Kim, Lee (bib0165) 2006; 45 Vukmirović, Erdeljan, Imre, Čapko (bib0360) 2012; 10 Kutter, Jordan, Bossen (bib0155) 1998; 7 Checkmark Benchmarking Cox, Kilian, Leighton, Shamoon (bib0090) 1997; 6 Voloshynovskiy (bib0355) 2001; 39 Coltuc, Bolon (bib0060) 1999; 2 Mikolajczyk, Schmid (bib0230) 2002; 2350 Barni (bib0030) 2005; 12 Cox, Miller, Bloom (bib0070) 2001 Liang, Cheng, Yang, Zhang (bib0415) 2013; 11 Dong, Galatsanos (bib0115) 2002; 3 Lin, Wu, Bloom, Cox, Miller, Lui (bib0190) 2000; 3971 Molina, Higuera, Prieto, Sandoval (bib0245) 2006 Petitcolas, Anderson (bib0270) 1998 Zheng, Liu, Zhao (bib0375) 2007; 39 Alvarez, Perez (bib0020) 2002; 17 Petitcolas, Anderson, Kuhn (bib0275) 1999; 87 Seo, Yoo (bib0310) 2006; 54 Cox (bib0085) 1996 Cedillo-Hernandez, Nakano-Miyatake, Garcia-Ugalde, Perez-Meana (bib0410) 2013; 11 2006 Merhav (bib0225) 2005 Mikolajczyk, Schmid (bib0240) 2002 Seo, Yoo (bib0305) 2004; 37 Cruz-Ramos, Reyes-Reyes, Nakano-Miyatake, Pérez-Meana (bib0400) 2010; 8 Kutter, Bhattacharjee, Ebrahimi (bib0150) 1999; 1 Zhang, Li, Wei (bib0395) 2012; 10 Matthew (bib0220) 1989; 8 Craver, Memon, Yeo, Yeung (bib0095) 1997; 3022 Solachidis, Pitas (bib0315) 2000 Perrig (bib0260) 1997 Petitcolas F., 1999. Prado-Molina, Peralta-Higuera, Palacio-Prieto, Sandoval (bib0295) 2010; 4 Lichtenauer, Setyawan, Kalker, Lagendijk (bib0180) 2003; 5 Elbaşı (bib0120) 2012; 10 Langelaar, Lagendijk, Biemond (bib0160) 1998 Pereira, Pun (bib0380) 2000; 9 Alghoniemy, Tewfik (bib0005) 2000; 3971 Holliman, Memon, Yeung (bib0130) 1999 Yu, Lu, Ling (bib0365) 2006 Lin, Brandt (bib0195) 1993; 14 Mikolajczyk (bib0235) 2002 Andreas, Jana (bib0025) 2006 Herrigel, Voloshynovskiy, Rytsar (bib0125) 2001 Ruanaidh, Pun (bib0300) 1998; 66 Kutter (bib0145) 1999; 3528 Pitas (bib0390) 1996 Holliman (10.1016/S1665-6423(14)71612-8_bib0130) 1999 Kim (10.1016/S1665-6423(14)71612-8_bib0140) 2004; 2 Petitcolas (10.1016/S1665-6423(14)71612-8_bib0270) 1998 Matthew (10.1016/S1665-6423(14)71612-8_bib0220) 1989; 8 Taboada (10.1016/S1665-6423(14)71612-8_bib0335) 2009; 1 Licks (10.1016/S1665-6423(14)71612-8_bib0185) 2005; 12 Cedillo-Hernandez (10.1016/S1665-6423(14)71612-8_bib0410) 2013; 11 Li (10.1016/S1665-6423(14)71612-8_bib0175) 2007; 63 Macq (10.1016/S1665-6423(14)71612-8_bib0215) 2004; 92 Vukmirović (10.1016/S1665-6423(14)71612-8_bib0360) 2012; 10 Lee (10.1016/S1665-6423(14)71612-8_bib0165) 2006; 45 Bas (10.1016/S1665-6423(14)71612-8_bib0035) 2002; 11 Cox (10.1016/S1665-6423(14)71612-8_bib0080) 1997 Cox (10.1016/S1665-6423(14)71612-8_bib0070) 2001 Elbaşı (10.1016/S1665-6423(14)71612-8_bib0120) 2012; 10 Luis (10.1016/S1665-6423(14)71612-8_bib0210) 2005 Seo (10.1016/S1665-6423(14)71612-8_bib0305) 2004; 37 Voloshynovskiy (10.1016/S1665-6423(14)71612-8_bib0355) 2001; 39 Alghoniemy (10.1016/S1665-6423(14)71612-8_bib0015) 2006; 15 Delannay (10.1016/S1665-6423(14)71612-8_bib0105) 2000; 2 Pitas (10.1016/S1665-6423(14)71612-8_bib0390) 1996 Mikolajczyk (10.1016/S1665-6423(14)71612-8_bib0230) 2002; 2350 Yu (10.1016/S1665-6423(14)71612-8_bib0365) 2006 Coltuc (10.1016/S1665-6423(14)71612-8_bib0060) 1999; 2 Petitcolas (10.1016/S1665-6423(14)71612-8_bib0280) 2001; 4314 Cox (10.1016/S1665-6423(14)71612-8_bib0065) 1998; 6 Herrigel (10.1016/S1665-6423(14)71612-8_bib0125) 2001 Cox (10.1016/S1665-6423(14)71612-8_bib0090) 1997; 6 Lichtenauer (10.1016/S1665-6423(14)71612-8_bib0180) 2003; 5 Prado-Molina (10.1016/S1665-6423(14)71612-8_bib0295) 2010; 4 Kutter (10.1016/S1665-6423(14)71612-8_bib0155) 1998; 7 Tao (10.1016/S1665-6423(14)71612-8_bib0350) 1996; 4 Lu (10.1016/S1665-6423(14)71612-8_bib0200) 2000; 2 Stankovic (10.1016/S1665-6423(14)71612-8_bib0320) 2001; 10 Liang (10.1016/S1665-6423(14)71612-8_bib0415) 2013; 11 10.1016/S1665-6423(14)71612-8_bib0265 Deng (10.1016/S1665-6423(14)71612-8_bib0110) 2009; 89 Takahashi (10.1016/S1665-6423(14)71612-8_bib0340) 2005; 53 Su (10.1016/S1665-6423(14)71612-8_bib0330) 1999 Alvarez (10.1016/S1665-6423(14)71612-8_bib0020) 2002; 17 Alghoniemy (10.1016/S1665-6423(14)71612-8_bib0005) 2000; 3971 Alghoniemy (10.1016/S1665-6423(14)71612-8_bib0010) 2000; 3 Tang (10.1016/S1665-6423(14)71612-8_bib0345) 2003; 51 Petitcolas (10.1016/S1665-6423(14)71612-8_bib0285) 1999; 87 Merhav (10.1016/S1665-6423(14)71612-8_bib0225) 2005 Cox (10.1016/S1665-6423(14)71612-8_bib0075) 2007 Yuan (10.1016/S1665-6423(14)71612-8_bib0370) 2006 Andreas (10.1016/S1665-6423(14)71612-8_bib0025) 2006 Zhang (10.1016/S1665-6423(14)71612-8_bib0395) 2012; 10 Cox (10.1016/S1665-6423(14)71612-8_bib0085) 1996 Moulin (10.1016/S1665-6423(14)71612-8_bib0250) 1999; 49 Kurak (10.1016/S1665-6423(14)71612-8_bib0385) 1992 10.1016/S1665-6423(14)71612-8_bib0050 Zheng (10.1016/S1665-6423(14)71612-8_bib0375) 2007; 39 Perrig (10.1016/S1665-6423(14)71612-8_bib0260) 1997 Kalker (10.1016/S1665-6423(14)71612-8_bib0135) 2001 Kutter (10.1016/S1665-6423(14)71612-8_bib0145) 1999; 3528 Kutter (10.1016/S1665-6423(14)71612-8_bib0150) 1999; 1 Ruanaidh (10.1016/S1665-6423(14)71612-8_bib0300) 1998; 66 Lu (10.1016/S1665-6423(14)71612-8_bib0205) 2006; 177 Deguillaume (10.1016/S1665-6423(14)71612-8_bib0100) 2000 Lin (10.1016/S1665-6423(14)71612-8_bib0195) 1993; 14 Pitas (10.1016/S1665-6423(14)71612-8_bib0290) 1996 Pereira (10.1016/S1665-6423(14)71612-8_bib0380) 2000; 9 Dong (10.1016/S1665-6423(14)71612-8_bib0115) 2002; 3 Cruz-Ramos (10.1016/S1665-6423(14)71612-8_bib0400) 2010; 8 Elbaşı (10.1016/S1665-6423(14)71612-8_bib0405) 2012; 10 Langelaar (10.1016/S1665-6423(14)71612-8_bib0160) 1998 Seo (10.1016/S1665-6423(14)71612-8_bib0310) 2006; 54 Christian (10.1016/S1665-6423(14)71612-8_bib0055) 2006 Craver (10.1016/S1665-6423(14)71612-8_bib0095) 1997; 3022 Petitcolas (10.1016/S1665-6423(14)71612-8_bib0275) 1999; 87 Solachidis (10.1016/S1665-6423(14)71612-8_bib0315) 2000 Pereira (10.1016/S1665-6423(14)71612-8_bib0255) 2000; 9 10.1016/S1665-6423(14)71612-8_bib0325 Bao (10.1016/S1665-6423(14)71612-8_bib0170) 2005; 15 Molina (10.1016/S1665-6423(14)71612-8_bib0245) 2006 10.1016/S1665-6423(14)71612-8_bib0040 Barni (10.1016/S1665-6423(14)71612-8_bib0030) 2005; 12 Lin (10.1016/S1665-6423(14)71612-8_bib0190) 2000; 3971 Mikolajczyk (10.1016/S1665-6423(14)71612-8_bib0235) 2002 Mikolajczyk (10.1016/S1665-6423(14)71612-8_bib0240) 2002 10.1016/S1665-6423(14)71612-8_bib0045 |
References_xml | – volume: 14 start-page: 369 year: 1993 end-page: 379 ident: bib0195 article-title: Towards absolute invariants of images under translation, rotation and dilatation publication-title: Pattern Recognit. Lett. – reference: , in: Stirmark 3.0 (60). – volume: 51 start-page: 950 year: 2003 end-page: 959 ident: bib0345 article-title: A feature-based robust digital image watermarking scheme publication-title: IEEE Trans. Signal Process – start-page: 128 year: 2002 end-page: 142 ident: bib0240 publication-title: An affine invariant interest point detector – start-page: 3 year: 2006 end-page: 23 ident: bib0245 article-title: Airborne high-resolution digital imaging system publication-title: Journal of Applied Research and Technology – volume: 177 start-page: 377 year: 2006 end-page: 386 ident: bib0205 article-title: Feature based watermarking using watermark template match publication-title: Appl. Math Comput. – volume: 10 start-page: 650 year: 2001 end-page: 658 ident: bib0320 article-title: Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution publication-title: IEEE Trans. Image Processing – volume: 45 start-page: 1 year: 2006 end-page: 11 ident: bib0165 article-title: Robust image watermarking using local invariant features publication-title: Opt. Eng. – reference: , 2006 – volume: 7 start-page: 326 year: 1998 end-page: 332 ident: bib0155 article-title: Digital watermarking of color images using amplitude modulation publication-title: J. Electron. Imag. – volume: 1 start-page: 320 year: 1999 end-page: 323 ident: bib0150 article-title: Toward second generation watermarking schemes publication-title: Proceedings of the IEEE International Conference Image Processing – reference: Cayre F., Fontaine C. and Furon T., 2005. Watermarking security, part I: theory, In: Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE. 5681. – volume: 6 start-page: 587 year: 1998 end-page: 593 ident: bib0065 article-title: Some general methods for tampering with watermarks publication-title: IEEE J. Selected Areas Communi. – volume: 2350 start-page: 128 year: 2002 end-page: 142 ident: bib0230 article-title: An affine invariant interest point detector publication-title: Proceedings of European Conference on Computer Vision – volume: 39 start-page: 118 year: 2001 end-page: 126 ident: bib0355 article-title: Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks publication-title: IEEE Communications Magazine – volume: 3022 start-page: 310 year: 1997 end-page: 321 ident: bib0095 article-title: Can invisible watermark resolve rightful ownerships publication-title: Fifth Conference on Storage and Retrieval for Image and Video Database – year: 2000 ident: bib0315 article-title: Self-similar ring shaped watermark embedding in 2-D DFT domain – volume: 12 start-page: 68 year: 2005 end-page: 78 ident: bib0185 article-title: Geometric attacks on image watermarking systems publication-title: IEEE Multimedia Magazine – start-page: 134 year: 1999 end-page: 146 ident: bib0130 publication-title: Watermark estimation through local pixel correlation – volume: 4 year: 2010 ident: bib0295 article-title: Airborne high-resolution digital imaging system publication-title: Journal of Applied Research and Technology – reference: Petitcolas F., 1999. – volume: 1 year: 2009 ident: bib0335 article-title: Images acquisition of multiphase dispersions in fermentation processes publication-title: Journal of Applied Research and Technology – volume: 49 start-page: 563 year: 1999 end-page: 593 ident: bib0250 article-title: Information-theoretic analysis of information hiding publication-title: IEEE Inform. Theory, preprint – volume: 12 start-page: 158 year: 2005 end-page: 161 ident: bib0030 article-title: Effectiveness of exhaustive search and template matching against watermark desynchronization publication-title: IEEE Signal Process. Lett. – volume: 5 start-page: 203 year: 2003 end-page: 214 ident: bib0180 article-title: Exhaustive geometrical search and the false positive watermark detection probability publication-title: Proc. SPIE Security and Watermarking of Multimedia Contents – volume: 9 start-page: 1123 year: 2000 end-page: 1129 ident: bib0380 article-title: Robust template matching for affine resistant image watermarks publication-title: IEEE Trans. Image Processing – volume: 37 start-page: 1365 year: 2004 end-page: 1375 ident: bib0305 article-title: Localized image watermarking based on feature points of scale-space representation publication-title: Pattern Recognition – volume: 6 start-page: 1673 year: 1997 end-page: 1678 ident: bib0090 article-title: Secure spread spectrum watermarking for multimedia publication-title: IEEE Transactions on Image Processing – year: 2002 ident: bib0235 publication-title: Interest point detection invariant to affine transformations – volume: 10 year: 2012 ident: bib0120 article-title: Robust MPEG Watermarking in DWT Four Bands publication-title: Journal of Applied Research and Technology – volume: 15 start-page: 96 year: 2005 end-page: 102 ident: bib0170 article-title: Image adaptive watermarking using wavelet domain singular value decomposition publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 2 start-page: 209 year: 2000 end-page: 224 ident: bib0200 article-title: Cocktail watermarking for digital image protection publication-title: IEEE Trans. Multimedia – volume: 89 start-page: 1531 year: 2009 end-page: 1539 ident: bib0110 article-title: A local Tchebichef moments-based robust image watermarking publication-title: Signal Process – volume: 53 start-page: 806 year: 2005 end-page: 815 ident: bib0340 article-title: Multiple watermarks for stereo audio signals using phase-modulation techniques publication-title: IEEE Transactions on Signal Processing – volume: 2 start-page: 72 year: 2000 end-page: 79 ident: bib0105 article-title: Generalized 2D Cyclic Patterns for Secret Watermark Generation publication-title: Proc. IEEE Int'l Conf. Image Processing – volume: 39 start-page: 1 year: 2007 end-page: 91 ident: bib0375 article-title: A survey of RST invariant image watermarking algorithms publication-title: ACM Comput. Surv. – volume: 87 start-page: 1062 year: 1999 end-page: 1078 ident: bib0285 article-title: Information Hiding: A survey publication-title: Proceedings of the IEEE (special issue) – volume: 2 start-page: 236 year: 1999 end-page: 239 ident: bib0060 article-title: Robust watermarking by histogram specification publication-title: Proc. IEEE Int. Conf. Image Processing – year: 2001 ident: bib0070 publication-title: Digital Watermarking – year: 1996 ident: bib0290 publication-title: A method for signature casting on digital images – start-page: 2632 year: 2006 end-page: 2635 ident: bib0370 article-title: Image content- based watermarking resistant against geometrical distortions – year: 1998 ident: bib0160 publication-title: Removing spatial spread spectrum watermarks by non-linear filtering – volume: 10 year: 2012 ident: bib0360 article-title: Optimal Workflow Scheduling in Critical Infrastructure Systems with Neural Networks publication-title: Journal of Applied Research and Technology – year: 2006 ident: bib0025 publication-title: Profiles for Evaluation - the Usage of Audio WET – reference: Checkmark Benchmarking, – year: 1997 ident: bib0260 publication-title: A copyright protection environment for digital images – start-page: 201 year: 2001 end-page: 206 ident: bib0135 publication-title: Considerations on watermarking security – volume: 10 start-page: 405 year: 2012 end-page: 415 ident: bib0395 article-title: An Improved Robust and Adaptive Watermarking Algorithm Based on DCT publication-title: Journal Of Applied Research And Technology – start-page: 234 year: 1996 end-page: 246 ident: bib0085 publication-title: Secure spread spectrum watermarking for images, audio and video – volume: 63 start-page: 123 year: 2007 end-page: 131 ident: bib0175 article-title: Localized image watermarking in spatial domain resistant to geometric attacks, Int publication-title: J. Electron. Commun. (AEU) – start-page: 215 year: 1996 end-page: 218 ident: bib0390 article-title: A method for signature casting on digital images – volume: 3971 start-page: 82 year: 2000 end-page: 89 ident: bib0005 article-title: Geometric distortion correction in image watermarking publication-title: Proc. SPIE Security and Watermarking of Multimedia Contents II – start-page: 142 year: 2007 end-page: 143 ident: bib0075 publication-title: Digital Watermarking and Steganography – volume: 11 start-page: 1014 year: 2002 end-page: 1028 ident: bib0035 article-title: Geometrically invariant watermarking using feature point publication-title: IEEE Transactions on Image Processing – reference: StirMark Benchmark, – year: 2006 ident: bib0055 publication-title: Transparency benchmarking on audio watermarks and steganography – volume: 4 start-page: 2985 year: 1996 end-page: 2988 ident: bib0350 article-title: Adaptive watermarking in the DCT domain publication-title: Proc. Int. Conf. Image Processing – volume: 3 start-page: 489 year: 2002 end-page: 492 ident: bib0115 article-title: Affine transformation resistant watermarking based on image normalization publication-title: Proceedings of International Conference on Image Processing – start-page: 394 year: 2001 end-page: 405 ident: bib0125 publication-title: The watermark template attack – volume: 11 start-page: 259 year: 2013 end-page: 271 ident: bib0415 article-title: A Blind Data Hiding Technique with Error Correction Abilities and a High Embedding Payload publication-title: Journal of Applied Research and Technology – start-page: 219 year: 1998 end-page: 239 ident: bib0270 article-title: Attacks on copyright marking systems publication-title: Second International Information Hiding Workshop – volume: 11 start-page: 764 year: 2013 end-page: 779 ident: bib0410 article-title: Cropping Resilient Watermarking Based on Histogram Modification publication-title: Journal of Applied Research and Technology – volume: 8 start-page: 29 year: 1989 end-page: 42 ident: bib0220 article-title: One the derivation of a chaotic encryption algorithm publication-title: Cryptologia – volume: 4314 start-page: 575 year: 2001 end-page: 584 ident: bib0280 article-title: Public automated web-based evaluation service for watermarking schemes: StirMark Benchmark publication-title: Security and Watermarking of Multimedia Contents III, Proceedings of SPIE – year: 1999 ident: bib0330 publication-title: Power-spectrun condition for energy-efficient watermarking, IEEE ICIP-99 – volume: 54 start-page: 1537 year: 2006 end-page: 1549 ident: bib0310 article-title: Image watermarking based on invariant regions of scale-space representation, IEEE Trans publication-title: Signal Process – volume: 15 start-page: 459 year: 2006 end-page: 472 ident: bib0015 article-title: Progressive quantized projection approach to data hiding publication-title: IEEE Transactions on Image Processing – year: 1997 ident: bib0080 publication-title: A review of watermarking and the importance of perceptual modeling – year: 2005 ident: bib0225 publication-title: An information-theoretic view ofwatermark embedding-detection and geometric attacks – volume: 9 start-page: 1123 year: 2000 end-page: 1129 ident: bib0255 article-title: Robust template matching for affine resistant image watermarks publication-title: IEEE Trans. Image Processing – volume: 17 start-page: 611 year: 2002 end-page: 633 ident: bib0020 article-title: Analysis of pilot- based synchronization algorithms for watermarking of still images publication-title: Signal Processing: Image Communication – volume: 92 start-page: 971 year: 2004 end-page: 984 ident: bib0215 article-title: Benchmarking of Image Watermarking Algorithms for Digital Rights Management publication-title: Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management – reference: Cayre F., Fontaine C. and Furon T., 2005. Watermarking security, part II: practice, In: Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE. 5681. – volume: 3 start-page: 1291 year: 2000 end-page: 1294 ident: bib0010 article-title: Geometric distortion correction through image normalization publication-title: Proc. IEEE Int. Conf. Multimedia and Expo – volume: 2 start-page: 375 year: 2004 end-page: 377 ident: bib0140 article-title: An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark publication-title: IEEE Signal Processing Tellers – start-page: 1270 year: 2006 end-page: 1273 ident: bib0365 article-title: A robust blind image watermarking scheme based on feature points and RS- invariant domain – start-page: 153 year: 1992 end-page: 159 ident: bib0385 article-title: A cautionary note on image downgrading – volume: 66 start-page: 303 year: 1998 end-page: 317 ident: bib0300 article-title: Rotation, scale and translation invariant digital image watermarking publication-title: Signal Process – volume: 87 start-page: 1062 year: 1999 end-page: 1078 ident: bib0275 article-title: Information hiding—A survey publication-title: Proceedings of the IEEE, special issue on protection of multimedia content – start-page: 131 year: 2005 end-page: 145 ident: bib0210 article-title: Information-Theoretic Analysis of Security in Side-Informed Data Hiding publication-title: Information Hiding – year: 2000 ident: bib0100 publication-title: Countermeasures for unintentional and intentional video watermarking attacks – volume: 8 start-page: 323 year: 2010 end-page: 337 ident: bib0400 article-title: A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression publication-title: Journal of applied research and technology – volume: 10 year: 2012 ident: bib0405 article-title: Robust MPEG Watermarking in DWT Four Bands publication-title: Journal of Applied Research and Technology – volume: 3528 start-page: 423 year: 1999 end-page: 431 ident: bib0145 article-title: Watermarking Resisting to Translation, Rotation, and Scaling publication-title: Proc. SPIE Multimedia Systems and Applications – volume: 3971 start-page: 90 year: 2000 end-page: 98 ident: bib0190 article-title: Rotation, scale, and translation- resilient public watermarking for images publication-title: Proc. SPIE— Security and Watermarking of Multimedia Contents II – volume: 177 start-page: 377 issue: 1 year: 2006 ident: 10.1016/S1665-6423(14)71612-8_bib0205 article-title: Feature based watermarking using watermark template match publication-title: Appl. Math Comput. doi: 10.1016/j.amc.2005.11.015 – volume: 39 start-page: 118 issue: 8 year: 2001 ident: 10.1016/S1665-6423(14)71612-8_bib0355 article-title: Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks publication-title: IEEE Communications Magazine doi: 10.1109/35.940053 – start-page: 394 year: 2001 ident: 10.1016/S1665-6423(14)71612-8_bib0125 – volume: 8 start-page: 323 issue: 3 year: 2010 ident: 10.1016/S1665-6423(14)71612-8_bib0400 article-title: A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression publication-title: Journal of applied research and technology doi: 10.22201/icat.16656423.2010.8.03.454 – volume: 49 start-page: 563 issue: 3 year: 1999 ident: 10.1016/S1665-6423(14)71612-8_bib0250 article-title: Information-theoretic analysis of information hiding publication-title: IEEE Inform. Theory, preprint doi: 10.1109/TIT.2002.808134 – volume: 6 start-page: 1673 issue: 12 year: 1997 ident: 10.1016/S1665-6423(14)71612-8_bib0090 article-title: Secure spread spectrum watermarking for multimedia publication-title: IEEE Transactions on Image Processing doi: 10.1109/83.650120 – volume: 2350 start-page: 128 year: 2002 ident: 10.1016/S1665-6423(14)71612-8_bib0230 article-title: An affine invariant interest point detector publication-title: Proceedings of European Conference on Computer Vision – year: 1997 ident: 10.1016/S1665-6423(14)71612-8_bib0080 – volume: 2 start-page: 375 year: 2004 ident: 10.1016/S1665-6423(14)71612-8_bib0140 article-title: An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark publication-title: IEEE Signal Processing Tellers doi: 10.1109/LSP.2003.822923 – year: 1996 ident: 10.1016/S1665-6423(14)71612-8_bib0290 – year: 1998 ident: 10.1016/S1665-6423(14)71612-8_bib0160 – volume: 10 start-page: 405 issue: 3 year: 2012 ident: 10.1016/S1665-6423(14)71612-8_bib0395 article-title: An Improved Robust and Adaptive Watermarking Algorithm Based on DCT publication-title: Journal Of Applied Research And Technology doi: 10.22201/icat.16656423.2012.10.3.397 – volume: 8 start-page: 29 issue: 1 year: 1989 ident: 10.1016/S1665-6423(14)71612-8_bib0220 article-title: One the derivation of a chaotic encryption algorithm publication-title: Cryptologia doi: 10.1080/0161-118991863745 – volume: 2 start-page: 209 issue: 4 year: 2000 ident: 10.1016/S1665-6423(14)71612-8_bib0200 article-title: Cocktail watermarking for digital image protection publication-title: IEEE Trans. Multimedia doi: 10.1109/6046.890056 – volume: 39 start-page: 1 issue: 2 year: 2007 ident: 10.1016/S1665-6423(14)71612-8_bib0375 article-title: A survey of RST invariant image watermarking algorithms publication-title: ACM Comput. Surv. doi: 10.1145/1242471.1242473 – year: 2002 ident: 10.1016/S1665-6423(14)71612-8_bib0235 – volume: 3022 start-page: 310 year: 1997 ident: 10.1016/S1665-6423(14)71612-8_bib0095 article-title: Can invisible watermark resolve rightful ownerships publication-title: Fifth Conference on Storage and Retrieval for Image and Video Database doi: 10.1117/12.263419 – start-page: 234 year: 1996 ident: 10.1016/S1665-6423(14)71612-8_bib0085 – start-page: 201 year: 2001 ident: 10.1016/S1665-6423(14)71612-8_bib0135 – start-page: 215 year: 1996 ident: 10.1016/S1665-6423(14)71612-8_bib0390 article-title: A method for signature casting on digital images – year: 2001 ident: 10.1016/S1665-6423(14)71612-8_bib0070 – ident: 10.1016/S1665-6423(14)71612-8_bib0040 doi: 10.1117/12.586876 – year: 2000 ident: 10.1016/S1665-6423(14)71612-8_bib0100 – volume: 4 start-page: 2985 year: 1996 ident: 10.1016/S1665-6423(14)71612-8_bib0350 article-title: Adaptive watermarking in the DCT domain publication-title: Proc. Int. Conf. Image Processing – volume: 45 start-page: 1 issue: 3 year: 2006 ident: 10.1016/S1665-6423(14)71612-8_bib0165 article-title: Robust image watermarking using local invariant features publication-title: Opt. Eng. – volume: 89 start-page: 1531 issue: 8 year: 2009 ident: 10.1016/S1665-6423(14)71612-8_bib0110 article-title: A local Tchebichef moments-based robust image watermarking publication-title: Signal Process doi: 10.1016/j.sigpro.2009.02.005 – start-page: 153 year: 1992 ident: 10.1016/S1665-6423(14)71612-8_bib0385 article-title: A cautionary note on image downgrading – volume: 10 issue: 2 year: 2012 ident: 10.1016/S1665-6423(14)71612-8_bib0360 article-title: Optimal Workflow Scheduling in Critical Infrastructure Systems with Neural Networks publication-title: Journal of Applied Research and Technology doi: 10.22201/icat.16656423.2012.10.2.398 – volume: 1 start-page: 320 year: 1999 ident: 10.1016/S1665-6423(14)71612-8_bib0150 article-title: Toward second generation watermarking schemes publication-title: Proceedings of the IEEE International Conference Image Processing – volume: 12 start-page: 68 issue: 3 year: 2005 ident: 10.1016/S1665-6423(14)71612-8_bib0185 article-title: Geometric attacks on image watermarking systems publication-title: IEEE Multimedia Magazine doi: 10.1109/MMUL.2005.46 – volume: 11 start-page: 259 year: 2013 ident: 10.1016/S1665-6423(14)71612-8_bib0415 article-title: A Blind Data Hiding Technique with Error Correction Abilities and a High Embedding Payload publication-title: Journal of Applied Research and Technology doi: 10.1016/S1665-6423(13)71536-0 – year: 2006 ident: 10.1016/S1665-6423(14)71612-8_bib0025 – volume: 37 start-page: 1365 issue: 7 year: 2004 ident: 10.1016/S1665-6423(14)71612-8_bib0305 article-title: Localized image watermarking based on feature points of scale-space representation publication-title: Pattern Recognition doi: 10.1016/j.patcog.2003.12.013 – volume: 11 start-page: 1014 issue: 9 year: 2002 ident: 10.1016/S1665-6423(14)71612-8_bib0035 article-title: Geometrically invariant watermarking using feature point publication-title: IEEE Transactions on Image Processing doi: 10.1109/TIP.2002.801587 – volume: 12 start-page: 158 issue: 2 year: 2005 ident: 10.1016/S1665-6423(14)71612-8_bib0030 article-title: Effectiveness of exhaustive search and template matching against watermark desynchronization publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2004.840872 – volume: 66 start-page: 303 issue: 3 year: 1998 ident: 10.1016/S1665-6423(14)71612-8_bib0300 article-title: Rotation, scale and translation invariant digital image watermarking publication-title: Signal Process doi: 10.1016/S0165-1684(98)00012-7 – volume: 3971 start-page: 82 year: 2000 ident: 10.1016/S1665-6423(14)71612-8_bib0005 article-title: Geometric distortion correction in image watermarking publication-title: Proc. SPIE Security and Watermarking of Multimedia Contents II doi: 10.1117/12.385011 – volume: 51 start-page: 950 issue: 4 year: 2003 ident: 10.1016/S1665-6423(14)71612-8_bib0345 article-title: A feature-based robust digital image watermarking scheme publication-title: IEEE Trans. Signal Process doi: 10.1109/TSP.2003.809367 – volume: 1 issue: 01 year: 2009 ident: 10.1016/S1665-6423(14)71612-8_bib0335 article-title: Images acquisition of multiphase dispersions in fermentation processes publication-title: Journal of Applied Research and Technology doi: 10.22201/icat.16656423.2003.1.01.613 – volume: 10 issue: 2 year: 2012 ident: 10.1016/S1665-6423(14)71612-8_bib0405 article-title: Robust MPEG Watermarking in DWT Four Bands publication-title: Journal of Applied Research and Technology – volume: 10 start-page: 650 year: 2001 ident: 10.1016/S1665-6423(14)71612-8_bib0320 article-title: Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution publication-title: IEEE Trans. Image Processing doi: 10.1109/83.913599 – start-page: 128 year: 2002 ident: 10.1016/S1665-6423(14)71612-8_bib0240 – start-page: 219 year: 1998 ident: 10.1016/S1665-6423(14)71612-8_bib0270 article-title: Attacks on copyright marking systems publication-title: Second International Information Hiding Workshop – volume: 10 issue: 2 year: 2012 ident: 10.1016/S1665-6423(14)71612-8_bib0120 article-title: Robust MPEG Watermarking in DWT Four Bands publication-title: Journal of Applied Research and Technology – volume: 2 start-page: 236 year: 1999 ident: 10.1016/S1665-6423(14)71612-8_bib0060 article-title: Robust watermarking by histogram specification publication-title: Proc. IEEE Int. Conf. Image Processing – volume: 63 start-page: 123 year: 2007 ident: 10.1016/S1665-6423(14)71612-8_bib0175 article-title: Localized image watermarking in spatial domain resistant to geometric attacks, Int publication-title: J. Electron. Commun. (AEU) doi: 10.1016/j.aeue.2007.11.007 – volume: 3971 start-page: 90 year: 2000 ident: 10.1016/S1665-6423(14)71612-8_bib0190 article-title: Rotation, scale, and translation- resilient public watermarking for images publication-title: Proc. SPIE— Security and Watermarking of Multimedia Contents II doi: 10.1117/12.385012 – volume: 17 start-page: 611 issue: 8 year: 2002 ident: 10.1016/S1665-6423(14)71612-8_bib0020 article-title: Analysis of pilot- based synchronization algorithms for watermarking of still images publication-title: Signal Processing: Image Communication – start-page: 142 year: 2007 ident: 10.1016/S1665-6423(14)71612-8_bib0075 – volume: 15 start-page: 459 issue: 2 year: 2006 ident: 10.1016/S1665-6423(14)71612-8_bib0015 article-title: Progressive quantized projection approach to data hiding publication-title: IEEE Transactions on Image Processing doi: 10.1109/TIP.2005.860318 – ident: 10.1016/S1665-6423(14)71612-8_bib0045 doi: 10.1117/12.586890 – volume: 54 start-page: 1537 issue: 4 year: 2006 ident: 10.1016/S1665-6423(14)71612-8_bib0310 article-title: Image watermarking based on invariant regions of scale-space representation, IEEE Trans publication-title: Signal Process – volume: 92 start-page: 971 issue: 6 year: 2004 ident: 10.1016/S1665-6423(14)71612-8_bib0215 article-title: Benchmarking of Image Watermarking Algorithms for Digital Rights Management publication-title: Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management – start-page: 1270 year: 2006 ident: 10.1016/S1665-6423(14)71612-8_bib0365 article-title: A robust blind image watermarking scheme based on feature points and RS- invariant domain – year: 1999 ident: 10.1016/S1665-6423(14)71612-8_bib0330 – start-page: 131 year: 2005 ident: 10.1016/S1665-6423(14)71612-8_bib0210 article-title: Information-Theoretic Analysis of Security in Side-Informed Data Hiding publication-title: Information Hiding – ident: 10.1016/S1665-6423(14)71612-8_bib0325 – volume: 3528 start-page: 423 year: 1999 ident: 10.1016/S1665-6423(14)71612-8_bib0145 article-title: Watermarking Resisting to Translation, Rotation, and Scaling publication-title: Proc. SPIE Multimedia Systems and Applications doi: 10.1117/12.337432 – volume: 53 start-page: 806 year: 2005 ident: 10.1016/S1665-6423(14)71612-8_bib0340 article-title: Multiple watermarks for stereo audio signals using phase-modulation techniques publication-title: IEEE Transactions on Signal Processing doi: 10.1109/TSP.2004.839901 – volume: 7 start-page: 326 issue: 2 year: 1998 ident: 10.1016/S1665-6423(14)71612-8_bib0155 article-title: Digital watermarking of color images using amplitude modulation publication-title: J. Electron. Imag. doi: 10.1117/1.482648 – volume: 14 start-page: 369 issue: 5 year: 1993 ident: 10.1016/S1665-6423(14)71612-8_bib0195 article-title: Towards absolute invariants of images under translation, rotation and dilatation publication-title: Pattern Recognit. Lett. doi: 10.1016/0167-8655(93)90114-S – volume: 9 start-page: 1123 year: 2000 ident: 10.1016/S1665-6423(14)71612-8_bib0255 article-title: Robust template matching for affine resistant image watermarks publication-title: IEEE Trans. Image Processing doi: 10.1109/83.846253 – year: 2005 ident: 10.1016/S1665-6423(14)71612-8_bib0225 – start-page: 2632 year: 2006 ident: 10.1016/S1665-6423(14)71612-8_bib0370 article-title: Image content- based watermarking resistant against geometrical distortions – volume: 11 start-page: 764 year: 2013 ident: 10.1016/S1665-6423(14)71612-8_bib0410 article-title: Cropping Resilient Watermarking Based on Histogram Modification publication-title: Journal of Applied Research and Technology doi: 10.1016/S1665-6423(13)71584-0 – volume: 87 start-page: 1062 issue: 7 year: 1999 ident: 10.1016/S1665-6423(14)71612-8_bib0285 article-title: Information Hiding: A survey publication-title: Proceedings of the IEEE (special issue) doi: 10.1109/5.771065 – ident: 10.1016/S1665-6423(14)71612-8_bib0050 – volume: 6 start-page: 587 issue: 4 year: 1998 ident: 10.1016/S1665-6423(14)71612-8_bib0065 article-title: Some general methods for tampering with watermarks publication-title: IEEE J. Selected Areas Communi. doi: 10.1109/49.668980 – volume: 5 start-page: 203 issue: 2 year: 2003 ident: 10.1016/S1665-6423(14)71612-8_bib0180 article-title: Exhaustive geometrical search and the false positive watermark detection probability publication-title: Proc. SPIE Security and Watermarking of Multimedia Contents doi: 10.1117/12.503186 – volume: 87 start-page: 1062 issue: 7 year: 1999 ident: 10.1016/S1665-6423(14)71612-8_bib0275 article-title: Information hiding—A survey publication-title: Proceedings of the IEEE, special issue on protection of multimedia content – volume: 4314 start-page: 575 year: 2001 ident: 10.1016/S1665-6423(14)71612-8_bib0280 article-title: Public automated web-based evaluation service for watermarking schemes: StirMark Benchmark publication-title: Security and Watermarking of Multimedia Contents III, Proceedings of SPIE doi: 10.1117/12.435442 – year: 1997 ident: 10.1016/S1665-6423(14)71612-8_bib0260 – volume: 2 start-page: 72 year: 2000 ident: 10.1016/S1665-6423(14)71612-8_bib0105 article-title: Generalized 2D Cyclic Patterns for Secret Watermark Generation publication-title: Proc. IEEE Int'l Conf. Image Processing – volume: 9 start-page: 1123 year: 2000 ident: 10.1016/S1665-6423(14)71612-8_bib0380 article-title: Robust template matching for affine resistant image watermarks publication-title: IEEE Trans. Image Processing doi: 10.1109/83.846253 – volume: 4 issue: 01 year: 2010 ident: 10.1016/S1665-6423(14)71612-8_bib0295 article-title: Airborne high-resolution digital imaging system publication-title: Journal of Applied Research and Technology – year: 2000 ident: 10.1016/S1665-6423(14)71612-8_bib0315 article-title: Self-similar ring shaped watermark embedding in 2-D DFT domain – volume: 15 start-page: 96 issue: 1 year: 2005 ident: 10.1016/S1665-6423(14)71612-8_bib0170 article-title: Image adaptive watermarking using wavelet domain singular value decomposition publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2004.836745 – start-page: 134 year: 1999 ident: 10.1016/S1665-6423(14)71612-8_bib0130 – ident: 10.1016/S1665-6423(14)71612-8_bib0265 – volume: 3 start-page: 489 year: 2002 ident: 10.1016/S1665-6423(14)71612-8_bib0115 article-title: Affine transformation resistant watermarking based on image normalization publication-title: Proceedings of International Conference on Image Processing doi: 10.1109/ICIP.2002.1039014 – volume: 3 start-page: 1291 year: 2000 ident: 10.1016/S1665-6423(14)71612-8_bib0010 article-title: Geometric distortion correction through image normalization publication-title: Proc. IEEE Int. Conf. Multimedia and Expo doi: 10.1109/ICME.2000.871003 – year: 2006 ident: 10.1016/S1665-6423(14)71612-8_bib0055 – start-page: 3 issue: 001 year: 2006 ident: 10.1016/S1665-6423(14)71612-8_bib0245 article-title: Airborne high-resolution digital imaging system publication-title: Journal of Applied Research and Technology |
SSID | ssj0068840 |
Score | 2.3601305 |
Snippet | Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 122 |
SubjectTerms | attacks robust security watermarking |
Title | Robust Image Watermarking Theories and Techniques: A Review |
URI | https://dx.doi.org/10.1016/S1665-6423(14)71612-8 |
Volume | 12 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaW9gIHBC2I0hb5UCTQykseThyX0wpRbQutBGxFxSWyHbdFYrNVN7301zN-xEnZqlAu0corT6LMZPx5Hp8R2hFVKhhTkmiqGaG5UKTQuSKwWgAaOWVaWCamw6N8ckwPTrKTweC6313SyJG6vrWv5H-0CmOgV9Mlew_NBqEwAL9Bv3AFDcP1n3T8dS6vFs1wf2YKb74L62Vt7Nu13MMm2OYGpi1P68L1offyAcuwVHhY6lmAXONbsxSAnwobY52In12BwLw-mzlKgs9h9HB-LmaiGv4Q_tgvsajDn2NZmTi-9U_nsCwPj0b9KERM28Ll4DjzPCOwl0lveNZkyYKcm4xdL7JfcWPH77LkzF1c4VsQbZir6OvEkF7FCSm6FazN2v-xsIVyw1DJZkSVRhTseEorpiweoNWEMZvi__QlZKDyonDNtO3Nu-6vd90TvYnpW_80t-OaHlaZPkGPvTbx2FnMUzTQ9Rp61KOeXEfvne1gazu4bzu4tR0Mmsed7eziMXaW8wwd732cfpgQf5AGUTRJGsJ4RiuTIdWAj7Oogq8RMAlP80gYfkjFAHbCNjgSMi-o4DJTPOJpVImMVwD_4_Q5WqnntX6BsFIqZhXTpxy-ZhYxyYQCOZzLKJUJyzYQbV9DqTzLvDns5Fd5pxI20ChMu3A0K3-bULTvuPRY0WHAEqzn7qkv73uvTfSwM_kttNJcXultgKKNfGVt5jfvC3wB |
linkProvider | Colorado Alliance of Research Libraries |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Robust+Image+Watermarking+Theories+and+Techniques%3A+A+Review&rft.jtitle=Journal+of+applied+research+and+technology&rft.au=Tao%2C+Hai&rft.au=Chongmin%2C+Li&rft.au=Mohamad+Zain%2C+Jasni&rft.au=Abdalla%2C+Ahmed+N.&rft.date=2014-02-01&rft.issn=1665-6423&rft.volume=12&rft.issue=1&rft.spage=122&rft.epage=138&rft_id=info:doi/10.1016%2FS1665-6423%2814%2971612-8&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_S1665_6423_14_71612_8 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1665-6423&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1665-6423&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1665-6423&client=summon |