Amiri et al., 2020 - Google Patents
Increasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks.Amiri et al., 2020
View PDF- Document ID
- 9154851609958344812
- Author
- Amiri A
- Mirzakuchaki S
- Publication year
- Publication venue
- Iranian Journal of Electrical & Electronic Engineering
External Links
Snippet
Watermarking has increased dramatically in recent years in the Internet and digital media. Watermarking is one of the powerful tools to protect copyright. Local image features have been widely used in watermarking techniques based on feature points. In various papers …
- 238000000605 extraction 0 abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/52—Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
- G06K9/527—Scale-space domain transformation, e.g. with wavelet analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/4671—Extracting features based on salient regional features, e.g. Scale Invariant Feature Transform [SIFT] keypoints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6261—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation partitioning the feature space
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karampidis et al. | A review of image steganalysis techniques for digital forensics | |
Qin et al. | Coverless image steganography: a survey | |
Tsai et al. | Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions | |
Hosny et al. | Robust color image watermarking using invariant quaternion Legendre-Fourier moments | |
Hegazi et al. | An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal | |
Yan et al. | Multi-scale image hashing using adaptive local feature extraction for robust tampering detection | |
Luo et al. | A review on blind detection for image steganography | |
Fadl et al. | Robust copy–move forgery revealing in digital images using polar coordinate system | |
Priyanka et al. | An improved block based copy-move forgery detection technique | |
Nawaz et al. | Advance hybrid medical watermarking algorithm using speeded up robust features and discrete cosine transform | |
Hamid et al. | A Comparison between using SIFT and SURF for characteristic region based image steganography | |
Tahaoglu et al. | Improved copy move forgery detection method via L* a* b* color space and enhanced localization technique | |
Shaik et al. | A Secure and Robust Autoencoder‐Based Perceptual Image Hashing for Image Authentication | |
Hatami et al. | An optimized robust and invisible digital image watermarking scheme in Contourlet domain for protecting rightful ownership | |
Jamali et al. | Robust watermarking using diffusion of logo into auto-encoder feature maps | |
US20070270978A1 (en) | Method for identifying marked content, such as by using a class-wise non-principal component approach | |
Dwivedi et al. | Geometrically robust digital image watermarking based on Zernike moments and FAST technique | |
El Hajji et al. | New image watermarking algorithm based on mixed scales wavelets | |
Yadav et al. | Lagrangian twin support vector regression and genetic algorithm based robust grayscale image watermarking | |
Amiri et al. | Increasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks. | |
Jabbar et al. | Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit | |
CN111284157B (en) | Commodity package anti-counterfeiting printing and verifying method based on fractional order steganography technology | |
Liu et al. | Novel robust multiple watermarking against regional attacks of digital images | |
Naseem et al. | Optimal secure information using digital watermarking and fuzzy rule base | |
Tripathi et al. | Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images |