Watermarking through image geometry change tracking
نویسندگان
چکیده
منابع مشابه
Binary image watermarking through biased binarization
This paper presents a watermarking algorithm for binary images. The original binary image is blurred to a gray-level image and we embed the watermark by biasing the threshold in binarization. A loop is used to control the quality of watermarked images and robustness, and a key is generated for extraction. We employ error correction codes to reduce extraction error. This algorithm can be applied...
متن کاملEnhance Robustness of Image-in-Image Watermarking through Data Partitioning
Vulnerability of watermarking schemes against intense signal processing attacks is generally a major concern, particularly when there are techniques to reproduce an acceptable copy of the original signal with no chance for detecting the watermark. In this paper, we propose a two-layer, data partitioning (DP) based, image in image watermarking method in the DCT domain to improve the watermark de...
متن کاملRegion Tracking through Image Sequences
This paper describes a new approach to the tracking of complex shapes through image sequences, that combines deformable region models and deformable contours. A new deformable region model is presented: its optimisation is based on texture correlation and is constrained by the use of a motion model, such as rigid, aane or homographic. The use of texture information (versus edge information) not...
متن کاملExposure Time Change Attack on Image Watermarking Systems
Wepropose an effective attack based on exposure time change and image fusion, called ETC attack. First, the ETC attack simulates a set of images with different exposure time using the watermarked image. Then it applies an image fusion method to blend the multiple images mentioned above and thus generates a new image similar to the original one. In this paper, we describe the rationale of the at...
متن کاملTwo Novel Chaos-Based Algorithms for Image and Video Watermarking
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Visual Informatics
سال: 2018
ISSN: 2468-502X
DOI: 10.1016/j.visinf.2018.03.001