27
Views
1
CrossRef citations to date
0
Altmetric
Original Article

Adaptive, scalable and robust watermarking for wavelet-based progressive image transmission

, , &
Pages 120-133 | Accepted 05 Jun 2011, Published online: 12 Nov 2013

REFERENCES

  • Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T. Digital watermarking and Steganography, 2008, 2nd edition (Morgan Kaufmann, San Francisco, CA).
  • Cox IJ, Miller ML. A review of watermarking and the importance of perceptual modeling. Proc. SPIE, 1997, 3016, 92–99.
  • Cvejic N. ‘Algorithms for audio watermarking and steganography’, PhD thesis, University of Oulu, Oulu, Finland, 2004.
  • Hartung F, Kutter M. Multimedia watermarking techniques. Proc. IEEE, 1999, 87, 1079–1107.
  • Tasdoken S, Cuhadar A. Watermarking digital image and video data. IEEE Signal Process. Mag. 2000, 17, 20–46.
  • Potdar VM, Han S, Chang E. A survey of digital image watermarking techniques, Proc. 3rd IEEE Int. Conf. on Industrial informatics: INDIN 2005, Perth, WA, Australia, August 2005, IEEE, pp. 709–719.
  • Shoemaker C. Hidden Bits: A Survey of Techniques for Digital Watermarking [online], 2002. [accessed at Oct. 2009], Available at: <http://www.vu.union.edu/˜shoemakc/watermarking/watermarking.html>.
  • Cox IJ, Miller ML. The first 50 years of electronic watermarking. EURASIP J. Appl. Signal Process., 2002, 2002, 126–132.
  • Craver S, Memon N, Yeo B, Yeung M. Resolving rightful ownerships with invisible watermarking techniques limitations, attacks, and implications. IEEE J. Select. Areas Commun., 1998, 16, 573–586.
  • Feng J, Lin I, Tsai C, Chu Y. Reversible watermarking: current status and key issues. Int. J. Network Secur., 2006, 2, 161–170.
  • Danyali H, Deljavan Amiri M. A multiresolution robust watermarking approach for scalable wavelet image compression. Lect. Notes Comput. Sci., 2008, 5259, 57–66.
  • Danyali H, Deljavan Amiri M. A scalable blind watermarking for progressive image transmission, Proc. 5th Iranian Conf. on Machine vision and image processing: MVIP 2008, Tabriz, Iran, November 2008,University of Tabriz, 11165001.
  • Deljavan Amiri M, Danyali H, Zahir-Azami B. An adaptive, robust and multiresolution image watermarking for progressive wavelet image coding, Proc. 6th Int. Conf. on Wireless communications, networking and mobile computing: WiCOM 2010, Chengdu, China, October 2010, IEEE, pp. 1–4.
  • Jayant NJ, Johnson J, Safranek R. Signal compression based on models of the human perception. Proc. IEEE, 1993, 81, 1385–1422.
  • Shapiro JM. Embedded image coding using zerotree of wavelet coefficients. IEEE Trans. Signal Process., 1993, 41, 3445–3462.
  • Chee YK. Survey of progressive image transmission methods. Int. J. Imag. Syst. Technol., 1999, 10, 3–19.
  • Said A, Pearlman WA. A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans. Circuits Syst. Video Technol., 1996, 6, 243–250.
  • Charrier M, Cruz DS, Larsson M. JPEG2000, the next millennium compression standard for still images, Proc. IEEE Int. Conf. on Multimedia computing systems, Florence, Italy, July 1999, IEEE, pp. 131–132.
  • Haskell BG, Howard PG, LeCun YA, Puria A, Ostermann J, Civanlar MR, Rabiner L, Bottou L, Haffner P. Image and video coding-emerging standards and beyond. IEEE Trans. Circuits Syst. Video Technol., 1998, 8, 814–837.
  • Zaid AO, Makhloufi A, Bouallegue A. Wavelet domain watermark embedding strategy using TTCQ quantization. Int. J. Comput. Sci. Network Secur., 2007, 7, 165–170.
  • Parker K, M, Fowler JE. Redundant-wavelet watermarking with pixel-wise masking, Proc. IEEE Int. Conf. on Image processing: ICIP 2005, Genova, Italy, September 2005, IEEE, pp. 685–688.
  • Makhloufi A, Zaid AQ, Bouallegue R, Bouallegue A. Watermark integration to wavelet image coding scheme, Proc. 8th IEEE Int. Symp. on Multimedia: ISM 2006, San Diego, CA, USA, December 2006, IEEE, pp. 685–689.
  • Lee D, Kim T, Lee S, Paik J. A robust watermarking algorithm using attack pattern analysis. Lect. Notes Comput. Sci., 2006, 4179, 757–766.
  • Tsai P, Hu Y, Chang C. A progressive secret reveal system based on SPIHT image transmission. Signal Process.: Image Commun., 2004, 19, 285–297.
  • Jafri SAR, Baqai S. Robust digital watermarking for wavelet-based compression, Proc. IEEE 9th Workshop on Multimedia signal processing: MMSP 2007, Grete, Greece, October 2007, IEEE, pp. 377–380.
  • Barni M, Bartolini F, Piva A. Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process., 2001, 10, 783–791.
  • Kang X, Zeng W, Huang J. A multi-band wavelet watermarking scheme. Int. J. Network Secur., 2008, 6, 121–126.
  • Pereira S, Pun T. Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process., 2000, 9, 1123–1129.
  • Solachidis V, Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans. Image Process., 2001, 10, 1741–1753.
  • Levicky D, Foris P. Human visual system models in digital image watermarking. Radioengineering, 2004, 13, 38–43.
  • Antonini M, Barlaud M, Mathieu P, Daubechies I. Image coding using wavelet transform. IEEE Trans. Image Process., 1992, 1, 205–220.
  • Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process., 2004, 13, 600–612.
  • Available at: <http://www.ece.uwaterloo.ca/z70wang/research/ssim/>.
  • Watson AB. DCT quantization matrices visually optimized for individual images. Proc. SPIE, 1993, 1913, 202–216.
  • Danyali H, Mertins A. Highly scalable image compression based on SPIHT for network applications, Proc. IEEE Int. Conf. on Image processing: ICIP 2002, Rochester, NY, USA,September 2002, IEEE Signal Processing Society, pp. 217–220.
  • Danyali H, Mertins A. Flexible, highly scalable, object-based wavelet image compression algorithm for network applications, IEE Proc. – Vis. Image Signal Process., 2004, 151, 498–510.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.