84
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Image watermarking through attack simulation based on block classification

, , , &
Pages 921-938 | Received 11 Oct 2010, Accepted 28 May 2011, Published online: 26 Sep 2012

References

  • Akhaee , MA . 2009 . Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor . IEEE transaction on multimedia , 11 ( 5 ) : 822 – 833 .
  • Alghoniemy , M and Tewfik , AH . 2004 . Geometric invariance in image watermarking . IEEE transactions on image process , 13 ( 2 ) : 145 – 153 .
  • Bao , P and Xiaohu , M . 2005 . Image adaptive watermarking using wavelet domain singular value decomposition . IEEE transactions on circuits and systems for video technology , 15 ( 1 ) : 96 – 102 .
  • Barni , M . 1998 . A DCT-domain system for robust image watermarking . Signal processing , 66 ( 3 ) : 357 – 372 .
  • Bender , W . 1996 . Techniques for data hiding . IBM systems journal , 35 ( 3 ) : 331 – 336 .
  • Boyer , JP , Duhamel , P and Balanc-Talon , J . 2008 . Scalar DC–QIM for semifragile authentication . IEEE transactions on information forensics and security , 3 ( 4 ) : 776 – 782 .
  • Chen , B and Wornell , GW . 2001 . Quantization index modulation: a class of provably good methods for digital watermarking and information embedding . IEEE transactions on information theory , 47 ( 4 ) : 1423 – 1443 .
  • Cheung , YM and Wu , HT . 2007 . A sequential quantization strategy for data embedding and integrity verification . IEEE transactions on circuits and systems for video technology , 17 ( 8 ) : 107 – 116 .
  • Chou , CH and Li , YC . 1995 . A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile . IEEE transactions on circuit and systems for video technology , 5 ( 6 ) : 467 – 476 .
  • Cox , IJ . 1997 . Secure spread spectrum watermarking for multimedia . IEEE transactions on image processing , 6 ( 12 ) : 1673 – 1687 .
  • Day , ML , Lee , SY and Jou , IC . 2007 . Multiple description watermarking based on quantization index modulus modulation . Journal of information science and engineering , 23 ( 6 ) : 1785 – 1800 .
  • Hsu , CT and Wu , JL . 1999 . Hidden digital watermarks in images . IEEE transactions on image processing , 8 ( 1 ) : 58 – 68 .
  • Huang , J . 1998 . Chen, L., and Shi, Y.Q., , An integrated classifier in classified coding. In: Proceeding of the (1998) IEEE international symposium on circuits and systems, 31 May–3 June (1998), Monterey, CA. Piscataway, NJ: IEEE, 4, 146–149
  • Huang , J and Shi , YQ . 1998 . Segmentation-based hybrid coding using luminance masking . Electronics letters , 34 ( 8 ) : 750 – 751 .
  • Kang , X , Huang , J and Zeng , W . 2008 . Improving robustness of quantization-based image watermarking via adaptive receiver . IEEE transactions on multimedia , 10 ( 6 ) : 953 – 959 .
  • Kim , SW . 1999 . Image adaptive watermarking scheme using visual model and BN distribution . Electronics letters , 35 ( 3 ) : 212 – 214 .
  • Lee , JS , Tsai , CT and Ko , CH . 2006 . Image watermarking through attack simulation . Optical engineering , 45 ( 2 ) : 027001-1 – 027001-11 .
  • Li , Q and Cox , IJ . 2007 . Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking . IEEE transactions on information forensics and security , 2 ( 2 ) : 127 – 139 .
  • Lin , WH . 2008 . An efficient watermarking method based on significant difference of wavelet coefficient quantization . IEEE transactions on multimedia , 10 ( 5 ) : 746 – 757 .
  • Lin , SD , Shie , SC and Guo , JY . 2010 . Improving the robustness of DCT-based image watermarking against JPEG compression . Computer standards and interfaces , 32 ( 1–2 ) : 54 – 60 .
  • Meerwald , P , Koidl , C and Uhl , A . 2009 . Attack on watermarking method based on significant difference of wavelet coefficient quantization . IEEE transactions on multimedia , 11 ( 5 ) : 1037 – 1041 .
  • Nadarajah , S and Kotz , S . 2007 . A comment on asymptotically optimal detection for additive watermarking in the DCT and DWT domains . IEEE transactions on image process , 16 ( 4 ) : 1182 – 1183 .
  • Nikolaidis , N and Pitas , I . 1998 . Robust image watermarking in the spatial domain . Signal processing , 66 ( 3 ) : 385 – 403 .
  • Nill , NB . 1985 . A visual model weighted cosine transform for image compression and quality assessment . IEEE transactions on communications , 33 ( 6 ) : 551 – 557 .
  • Park , J . (1994). Some adaptive quantizers for HDTV image compression. Signal processing of HDTV. V. New York: Elsevier Publishing Company
  • Parthasarathy , AK and Kak , S . 2007 . An improved method of content-based image watermarking . IEEE transactions on broadcasting , 53 ( 2 ) : 468 – 479 .
  • Peterson , HA . 1993 . Ahumada Jr, A.J., and Watson, A.B., , An improved detection model for DCT coefficient quantization. In: Proceedings of SPIE conference on human vision, visual processing, and digital display, 31 January–4 February 1993, San Jose, CA. 1913, 191–201
  • Podilchuk , CI and Zeng , W . 1998 . Image adaptive watermarking using visual models . IEEE journal on selected areas in communication , 16 ( 4 ) : 523 – 539 .
  • Rahman , SMM , Ahmad , MO and Swamy , MNS . 2009 . A new statistical detector for DWT-based additive image watermarking using the Gauss-Hermite expansion . IEEE transactions on image processing , 18 ( 8 ) : 1782 – 1796 .
  • Shterev , I and Lagendijk , R . 2006 . Amplitude scale estimation for quantization-based watermarking . IEEE transactions on signal processing , 54 ( 11 ) : 4146 – 4155 .
  • Swanson , MD . 1996 . Zhu, B., and Tewfik, A.H., , Robust data hiding for images. In: IEEE digital signal processing workshop, 1–4 September (1996), Loen. Piscataway, NJ: IEEE, 37–40
  • Tang , CW and Hang , HM . 2003 . A feature-based robust digital image watermarking scheme . IEEE transactions on signal processing , 51 ( 4 ) : 950 – 959 .
  • Tong , HHY and Venetsanopoulos , AN . A perceptual model for JPEG applications based on block classification, texture masking, and luminance masking . In: IEEE international conference on image processing (ICASSP) . 4–7 October 1998 , Chicago . IL. Piscataway, NJ: IEEE, 428–432
  • Tran , TD and Safranek , R . 1996 . A locally adaptive perceptual masking threshold model for image coding . IEEE international conference on acoustics . 1996 , speech , and signal processing. 7–10 May (1996), Atlanta, GA. Piscataway, NJ: IEEE, 4, 1882–1885
  • Voyatzis , G and Pitas , I . Chaotic watermarks for embedding in the spatial domain . Proceedings of international conference on image processing ICIP’98 . 4–7 October 1998 , Chicago . IL. Piscataway, NJ: IEEE, 432–436
  • Wang , Y , Doherty , JF and van Dyck , RE . 2002 . A wavelet-based watermarking algorithm for ownership verification of digital images . IEEE transactions on image processing , 11 ( 2 ) : 77 – 88 .
  • Watson , AB . 1992 . DCT quantization matrices visually optimized for individual images . Proceedings of SPIE conference on human vision . 1992 , visual processing , and digital display. 10–13 February 1992, San Jose, CA. IV, 202–216
  • Wong , PHW and Au , OC . 2003 . A capacity estimation technique for JPEG-to-JPEG image watermarking . IEEE transactions on circuits system for video technoogyly , 13 ( 8 ) : 746 – 752 .
  • Zhong , J and Huang , S . 2007 . Double sided watermark embedding and detection . IEEE transactions on information forensics and security , 2 ( 3 ) : 297 – 310 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.