19
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Information hiding at oblivious watermarking scheme upon alternative thresold in spatial domains

Pages 359-384 | Received 01 May 2006, Published online: 03 Jun 2013

References

  • Bender , W. , Gruhl , D. and Morimoto , N. 1996 . Techniques for data hiding . IBM Systems Journal , 35 ( 3–4 ) : 313 – 336 .
  • Chen , T. S. , Chang , C. C. and Hwang , M. S. 1998 . A virtual image cryptosystem based upon vector quantization . IEEE Trans. on Image Processing , 7 ( 10 ) October : 1485 – 1488 .
  • Cox , I. J. , Kilian , J. , Leighton , T. and Shamoon , T. 1995 . Secure spread spectrum watermarking for multimedia . NEC Research Institute Technical Report , 9510
  • Fridrich , J. Robust bit extraction from images . IEEE International Conference on Multimedia Computing and Systems (CMCS’99) . Florence , Italy . Vol. 2 , pp. 536 – 540 . in
  • Herrigel , A. , Ó Ruanaidh , J. J. K. , Petersen , H. , Pereira , S. and Pun , T. 1998 . “ Secure copyright protection techniques for digital images ” . In Information Hiding, Lecture Notes in Computer Science , Edited by: Aucsmith , D. Vol. 1525 , 169 – 190 . Berlin : Springer . in
  • Hsu , C. T. and Wu , J. L. 1999 . Hidden digital watermarks in images . IEEE Trans. Image Processing , 8 : 58 – 68 .
  • Johnson , N. F. and Jajodia , S. 1998 . Steganography: seeing the unseen . IEEE Computer , February : 26 – 34 .
  • Kotropoulos , C. and Pitas , I. 1996 . Adaptive LMS L-filters for noise suppression in images . IEEE Transactions on Image Processing , 5 ( 12 ) December : 1596 – 1609 .
  • Lee , C. H. and Lee , Y. K. 1999 . An adaptive digital image watermarking technique for copyright protection . IEEE Transactions on Consumer Electronics , 45 ( 4 ) November : 1005 – 1015 .
  • Lu , C. S. , Huang , S. K. , Sze , C. J. and Liao , H. Y. M. 2000 . Cocktail watermarking for digital image protection . IEEE Transaction on Multimedia , 2 ( 4 ) December
  • Lu , C. S. , Mark , H. Y. , Liao and Kutter , M. 2002 . Denoising and copy attacks resilient watermarking by exploiting knowledge at detector . IEEE Transaction on Image Processing , 11 ( 3 ) : 280 – 292 .
  • Nikolaidis , N. and Pitas , I. May 1996 . “ Copyright protection of images using robust digital signatures ” . In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP-96) Vol. 4 , May , 2168 – 2171 . in
  • van Schyndel , R. G. , Tirkel , A. Z. and Osborne , C. F. A digital watermark . Proceeding of IEEE International Conference of Image Processing . Austin , Texas . Vol. 2 , November . pp. 86 – 90 . in
  • Swanson , M. D. , Zhu , B. and Tewfik , A. H. Robust data hiding for images . Proceeding IEEE Digital Signal Processing Workshop . Loen , Norway . September . pp. 37 – 40 . in
  • Voyatzis , G. and Pitas , I. 1998 . Digital Image Watermarking Using Mixing Systems . Computer & Graphics, Elsevier , 22 ( 3 ) : 405 – 416 .
  • Wang , S. J. February 2004 . “ The high capacity in embedding logo implementing the intellectual property using tree-oriented coding mechanism ” . In Bulletin of the College of Engineering , February , 119 – 126 . Taiwan : National Taiwan University .
  • Wang , S. J. 2005 . Steganography of capacity required using modulo operator for embedding secret image . Applied Mathematics and Computation , 164 May : 99 – 116 .
  • Yu , G. J. , Lu , C. S. and Mark Liao , H. Y. 2003 . A message-based cocktail watermarking system . Pattern Recognition , 36 ( 4 ) : 957 – 968 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.