dc.contributor | 應數系 | en_US |
dc.creator (作者) | 曾正男 | zh_TW |
dc.creator (作者) | Tzeng,Jeng-Nan | en_US |
dc.creator (作者) | Hwang,WL | en_US |
dc.creator (作者) | Chern,IL | en_US |
dc.date (日期) | 2002.07 | en_US |
dc.date.accessioned | 7-Aug-2014 11:35:55 (UTC+8) | - |
dc.date.available | 7-Aug-2014 11:35:55 (UTC+8) | - |
dc.date.issued (上傳時間) | 7-Aug-2014 11:35:55 (UTC+8) | - |
dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/68421 | - |
dc.description.abstract (摘要) | The watermarking method has emerged as an important tool for content tracing, authentication, and data hiding in multimedia applications. We propose a watermarking strategy in which the watermark of a host is selected from the robust features of the estimated forged images of the host. The forged images are obtained from Monte Carlo simulations of potential pirate attacks on the host image. The solution of applying an optimization technique to the second-order statistics of the features of the forged images gives two orthogonal spaces. One of them characterizes most of the variations in the modifications of the host. Our watermark is embedded in the other space that most potential pirate attacks do not touch. Thus, the embedded watermark is robust. Our watermarking method uses the same framework for watermark detection with a reference and blind detection. We demonstrate the performance of our method under various levels of attacks. | en_US |
dc.format.extent | 107 bytes | - |
dc.format.mimetype | text/html | - |
dc.language.iso | en_US | - |
dc.relation (關聯) | IEEE Trans. Image Processing,11(7)771-782 | en_US |
dc.title (題名) | Enhancing image watermarking methods with/without reference images by optimization on second-order statistics. | en_US |
dc.type (資料類型) | article | en |