2006
DOI: 10.1109/tmm.2006.876300
|View full text |Cite
|
Sign up to set email alerts
|

Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection

Abstract: The major disadvantage of existing watermarking methods is their limited resistance to extensive geometric attacks. In addition, we have found that the weakness of multiple watermark embedding methods that were initially designed to resist geometric attacks is their inability to withstand the watermark-estimation attacks (WEAs), leading to reduce resistance to geometric attacks. In view of these facts, this paper proposes a robust image watermarking scheme that can withstand geometric distortions and WEAs simu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Histograms constructed from low-frequency component are usually considered more robust against compressing and filtering-like image manipulations. Some schemes suggest the Gaussian low-pass filtering [2,[26][27][28] for this purpose. However, this filtering brings the loss of watermark energy at the watermark extraction phase due to its side effect.…”
Section: Histogram Construction In Low Frequency Domainmentioning
confidence: 99%
“…Histograms constructed from low-frequency component are usually considered more robust against compressing and filtering-like image manipulations. Some schemes suggest the Gaussian low-pass filtering [2,[26][27][28] for this purpose. However, this filtering brings the loss of watermark energy at the watermark extraction phase due to its side effect.…”
Section: Histogram Construction In Low Frequency Domainmentioning
confidence: 99%
“…The extracted watermark and reconstructed MI are compared with the original watermark and the original MI respectively and evaluated using the quality metric parameters PSNR, MSE and SSIM. Also the system robustness is verified against various attacks like JPEG compression, Median filter, Wiener filter, and Gaussian filter, Image cropping, Image rotation and Image resize [11] [14]. www.ijacsa.thesai.org…”
Section: ) After Successful Authentication Svd Is Applied To the Hhmentioning
confidence: 99%