4
Views
1
CrossRef citations to date
0
Altmetric
Articles

Digital watermarking method using compression concept and coefficient difference

Pages 155-163 | Published online: 18 Jul 2013

References

  • Chen, L.-H. and Lin, J.-J. Mean quantization based image watermarking. Image Vision Comput., 2003, 21, 717–727.
  • Lou, D.-C. and Liu, J.-L. A robust watermarking scheme based on the just-noticeable-distortion. J. Chung Cheng Inst. Technol., 2003, 31, 11–22.
  • Nikolaidis, N. and Pitas, I.Robust image watermarking in the spatial domain. Signal Process., 1998, 66, 385–403.
  • Lou, D.-C. and Liu, J.-L. Steganographic method for secure communications. Comput. Security, 2002, 21, 449–460.
  • Liu, J.-C. and Chen, S.-Y. Fast two-layer image watermarking without referring to the original image and watermark. Image Vision Comput., 2001, 19, 1083–1097.
  • Chų S.-C., Roddick, J. F., Lu, Z.-M. and Pan, J.-S. A digital image watermarking method based on labeledbisecting clustering algorithm. IEICE Trans. Fund., 2004, E87-A, 282–285.
  • Celik, M. U., Sharma, G., Tekalp, A. M. and Saber, E. Lossless generalized-LSB data embedding. IEEE Trans. Image Process., 2005, 14, 253–266.
  • Lou, D.-C. and Yin, T.-L. Adaptive digital watermarking using fuzzy clustering technique. IEICE Trans. Fund., 2001, E84-A, 2052–2060.
  • Cox, I. J., Kilian, J., Leighton, F. T. and Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process., 1997, 6, 1673–1687.
  • Hsieh, M.-S., Tseng, D.-C. and Huang, Y.-H. Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans. Ind. Electr., 2001, 48, 875–882.
  • Inoue, H., Miyazaki, A., Yamamoto, A. and Katsura, T. A digital watermark technique based on the wavelet transform and its robustness on image compression and transformation. IEICE Trans. Fund., 1999, E82-A, 2–10.
  • Wong, P. H. W., Au, O. C. and Yeung, Y. M. A novel blind multiple watermarking technique for images. IEEE Trans. Circ. Syst. Video Technol., 2003, 13, 813–830.
  • Ryu, Y.-J. and Lee, K.-Y. Robust image watermarking based on minimal DCT-quantizaton errors. IEICE Trans. Fund., 2002, E85-A, 1336–1340.
  • Wang, Y., Doherty, J. F. and Van Dyck, R. E. A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process., 2002, 11, 77–88.
  • Chang, C.-H., Ye, Z. and Zhang, M. Fuzzy-ART based adaptive digital watermarking scheme. IEEE Trans. Circ. Syst. Video Technol., 2005, 15, 65–81.
  • Lou, D.-C., Shieh, J.-M. and Tso, H.-K. Copyright protection scheme based on chaos and secret sharing techniques. Opt. Eng., 2005, 44, 117004–1 –117004-8.
  • Zeng, W. and Liu, B. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images. IEEE Trans. Image Process., 1999, 8, 1534–1548.
  • Meerwald, P. and Uhl, A. A survey of wavelet-domain watermarking algorithms. Electronic Imaging, Security and Watermarking of Multimedia Contents III, Proc. SPIE, Vol. 4314, 2001, pp. 505–516 (SPIE, Bellingham, WA).
  • Kim, Y.-S., Kwon, O. H. and Park, R. H. Wavelet based watermarking method for digital images using the human visual system. Proc. IEEE Int. Symp. Circ. Syst., 1999, 4, 80–83.
  • Barni, M., Bartolini, F. and Piva, A. Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process., 2001, 10, 783–791.
  • Lou, D.-C. and Sung, C.-H. A steganographic scheme for secure communications based on the chaos and Euler theorem. IEEE Trans. Multimedia, 2004, 6, 501–509.
  • Voyatzis, G. and Pitas, I. Application of toral automorphism in image watermarking. Proc. IEEE Int. Conf. Image Process., 1996, 2, 237–240.
  • Zhao, D., Chen, G. and Liu, W. A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons Fractals, 2004, 22, 47–54.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.