Publications-Periodical Articles

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 Enhancing image watermarking methods with/without reference images by optimization on second-order statistics.
作者 曾正男
Tzeng,Jeng-Nan
Hwang,WL
Chern,IL
貢獻者 應數系
日期 2002.07
上傳時間 7-Aug-2014 11:35:55 (UTC+8)
摘要 The watermarking method has emerged as an important tool for content tracing, authentication, and data hiding in multimedia applications. We propose a watermarking strategy in which the watermark of a host is selected from the robust features of the estimated forged images of the host. The forged images are obtained from Monte Carlo simulations of potential pirate attacks on the host image. The solution of applying an optimization technique to the second-order statistics of the features of the forged images gives two orthogonal spaces. One of them characterizes most of the variations in the modifications of the host. Our watermark is embedded in the other space that most potential pirate attacks do not touch. Thus, the embedded watermark is robust. Our watermarking method uses the same framework for watermark detection with a reference and blind detection. We demonstrate the performance of our method under various levels of attacks.
關聯 IEEE Trans. Image Processing,11(7)771-782
資料類型 article
dc.contributor 應數系en_US
dc.creator (作者) 曾正男zh_TW
dc.creator (作者) Tzeng,Jeng-Nanen_US
dc.creator (作者) Hwang,WLen_US
dc.creator (作者) Chern,ILen_US
dc.date (日期) 2002.07en_US
dc.date.accessioned 7-Aug-2014 11:35:55 (UTC+8)-
dc.date.available 7-Aug-2014 11:35:55 (UTC+8)-
dc.date.issued (上傳時間) 7-Aug-2014 11:35:55 (UTC+8)-
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/68421-
dc.description.abstract (摘要) The watermarking method has emerged as an important tool for content tracing, authentication, and data hiding in multimedia applications. We propose a watermarking strategy in which the watermark of a host is selected from the robust features of the estimated forged images of the host. The forged images are obtained from Monte Carlo simulations of potential pirate attacks on the host image. The solution of applying an optimization technique to the second-order statistics of the features of the forged images gives two orthogonal spaces. One of them characterizes most of the variations in the modifications of the host. Our watermark is embedded in the other space that most potential pirate attacks do not touch. Thus, the embedded watermark is robust. Our watermarking method uses the same framework for watermark detection with a reference and blind detection. We demonstrate the performance of our method under various levels of attacks.en_US
dc.format.extent 107 bytes-
dc.format.mimetype text/html-
dc.language.iso en_US-
dc.relation (關聯) IEEE Trans. Image Processing,11(7)771-782en_US
dc.title (題名) Enhancing image watermarking methods with/without reference images by optimization on second-order statistics.en_US
dc.type (資料類型) articleen