2013
DOI: 10.1117/1.jei.22.3.033009
|View full text |Cite
|
Sign up to set email alerts
|

Robust image watermarking based on luminance modification

Abstract: Abstract. A robust image watermarking technique based on a modification of the luminance component of the host color image is described. Three methods are proposed in the watermarking scheme in order to improve its performance in terms of accuracy of the extracted watermark and robustness of the embedded watermark. These methods are a new approach to watermark embedding in the luminance component of a host image and a new original image prediction technique in the watermark extraction process. A set of experim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…The twenty five strongest points are used reference points for watermark embedding and extraction purpose. The proposed scheme uses YCbCr color space instead of RGB and use its luminance (Y) part for embedding and extraction purpose which makes the scheme resilience against high lossy compression [38]. Because human visual system is highly sensitive to the modifications in the 'Y' component the embedding process perceptually shaped the watermark in all the frames considering only the twenty five strongest points of each frame of the video.…”
Section: Obtaining Watermark Embedding Locationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The twenty five strongest points are used reference points for watermark embedding and extraction purpose. The proposed scheme uses YCbCr color space instead of RGB and use its luminance (Y) part for embedding and extraction purpose which makes the scheme resilience against high lossy compression [38]. Because human visual system is highly sensitive to the modifications in the 'Y' component the embedding process perceptually shaped the watermark in all the frames considering only the twenty five strongest points of each frame of the video.…”
Section: Obtaining Watermark Embedding Locationsmentioning
confidence: 99%
“…Because human visual system is highly sensitive to the modifications in the 'Y' component the embedding process perceptually shaped the watermark in all the frames considering only the twenty five strongest points of each frame of the video. Limiting the number of points to only twenty five will reduce the effect of the embedded watermark on luminance component and at the same time it improves the quality of the watermarked frame [38].…”
Section: Obtaining Watermark Embedding Locationsmentioning
confidence: 99%
“…Such attacks are easy to implement and make many of the existing watermarking algorithms ineffective. Examples of geometric attacks include rotation, scaling, translation, shearing, random bending, and change of aspect ratio [15]. Such attacks are effective in such a way that they can destroy the synchronization of watermarking bit streams.…”
Section: Introductionmentioning
confidence: 99%
“…The authors employed the correlation-based detector using the eight neighboring pixels of the embedded pixel. Recently, Mettripun et al [15] proposed an improved method by using the Gaussian mask and the permutation spreader. All these methods [15], [11], [2], [12] use the black and white watermark image with the same size as the host image.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation