Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/68421
DC FieldValueLanguage
dc.contributor應數系en_US
dc.creator曾正男zh_TW
dc.creatorTzeng,Jeng-Nanen_US
dc.creatorHwang,WLen_US
dc.creatorChern,ILen_US
dc.date2002.07en_US
dc.date.accessioned2014-08-07T03:35:55Z-
dc.date.available2014-08-07T03:35:55Z-
dc.date.issued2014-08-07T03:35:55Z-
dc.identifier.urihttp://nccur.lib.nccu.edu.tw/handle/140.119/68421-
dc.description.abstractThe watermarking method has emerged as an important tool for content tracing, authentication, and data hiding in multimedia applications. We propose a watermarking strategy in which the watermark of a host is selected from the robust features of the estimated forged images of the host. The forged images are obtained from Monte Carlo simulations of potential pirate attacks on the host image. The solution of applying an optimization technique to the second-order statistics of the features of the forged images gives two orthogonal spaces. One of them characterizes most of the variations in the modifications of the host. Our watermark is embedded in the other space that most potential pirate attacks do not touch. Thus, the embedded watermark is robust. Our watermarking method uses the same framework for watermark detection with a reference and blind detection. We demonstrate the performance of our method under various levels of attacks.en_US
dc.format.extent107 bytes-
dc.format.mimetypetext/html-
dc.language.isoen_US-
dc.relationIEEE Trans. Image Processing,11(7)771-782en_US
dc.titleEnhancing image watermarking methods with/without reference images by optimization on second-order statistics.en_US
dc.typearticleen
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextrestricted-
item.languageiso639-1en_US-
item.cerifentitytypePublications-
item.fulltextWith Fulltext-
item.openairetypearticle-
Appears in Collections:期刊論文
Files in This Item:
File Description SizeFormat
index.html107 BHTML2View/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.