2006 Canadian Conference on Electrical and Computer Engineering 2006
DOI: 10.1109/ccece.2006.277712
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of RST Invariant Image Watermarking Algorithms

Abstract: In this paper, we review the algorithms for rotation, scaling and translation (RST) invariant image watermarking. There are mainly two categories of RST invariant image watermarking algorithms. One is to resynchronize the RST transformed image before conducting watermark extraction. Another is to embed and extract watermark in an RST invariant or semi-invariant domain. We discuss in detail the work principles of the typical RST invariant image watermarking algorithms, analyze the performance of these typical a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
27
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(27 citation statements)
references
References 17 publications
0
27
0
Order By: Relevance
“…Basically, the feature parameters acquired in the foregoing DWT-SVD-DCT domain are not rotation-scaling-translation (RST) invariant. To cope with the RST attacks, the proposed scheme needs to cooperate with other techniques, such as those discussed in [41]. Table 2 presents the average BER's respectively obtained by the compared schemes.…”
Section: Experimental Results and Analysismentioning
confidence: 98%
“…Basically, the feature parameters acquired in the foregoing DWT-SVD-DCT domain are not rotation-scaling-translation (RST) invariant. To cope with the RST attacks, the proposed scheme needs to cooperate with other techniques, such as those discussed in [41]. Table 2 presents the average BER's respectively obtained by the compared schemes.…”
Section: Experimental Results and Analysismentioning
confidence: 98%
“…The main methods include: (1) Watermark synchronization is achieved using the local characteristic regions. (2) The binary watermark image is embedded into the local invariant regions repeatedly in DWT domain in a content-based manner. Extensive simulation results on Stirmark 4.0 show that the proposed scheme can resist both signal processing attacks and geometric attacks.…”
Section: Discussionmentioning
confidence: 99%
“…However, the ability to resist geometric attacks is still one of the most challenging issues. Current countermeasures can be classified as invariant domain embedding, template based embedding and feature based embedding [1,2]. In this paper, we address the feature based image watermarking scheme.…”
Section: Introductionmentioning
confidence: 99%
“…This embedding technology should not substantially degrade the perceptual quality of the host signal. Moreover, the important issues that should be considered in every watermarking scheme are: robustness, data rate and imperceptibility of watermark insertion [22]. As a consequence, how to achieve the trade-off among these requirements of digital watermarking system is a challenging problem.…”
mentioning
confidence: 99%