[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Amiri et al., 2020 - Google Patents

Increasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks.

Amiri et al., 2020

View PDF
Document ID
9154851609958344812
Author
Amiri A
Mirzakuchaki S
Publication year
Publication venue
Iranian Journal of Electrical & Electronic Engineering

External Links

Snippet

Watermarking has increased dramatically in recent years in the Internet and digital media. Watermarking is one of the powerful tools to protect copyright. Local image features have been widely used in watermarking techniques based on feature points. In various papers …
Continue reading at www.sid.ir (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • G06K9/52Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
    • G06K9/527Scale-space domain transformation, e.g. with wavelet analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30244Information retrieval; Database structures therefor; File system structures therefor in image databases
    • G06F17/30247Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • G06K9/4671Extracting features based on salient regional features, e.g. Scale Invariant Feature Transform [SIFT] keypoints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6261Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation partitioning the feature space
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis

Similar Documents

Publication Publication Date Title
Karampidis et al. A review of image steganalysis techniques for digital forensics
Qin et al. Coverless image steganography: a survey
Tsai et al. Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions
Hosny et al. Robust color image watermarking using invariant quaternion Legendre-Fourier moments
Hegazi et al. An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal
Yan et al. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection
Luo et al. A review on blind detection for image steganography
Fadl et al. Robust copy–move forgery revealing in digital images using polar coordinate system
Priyanka et al. An improved block based copy-move forgery detection technique
Nawaz et al. Advance hybrid medical watermarking algorithm using speeded up robust features and discrete cosine transform
Hamid et al. A Comparison between using SIFT and SURF for characteristic region based image steganography
Tahaoglu et al. Improved copy move forgery detection method via L* a* b* color space and enhanced localization technique
Shaik et al. A Secure and Robust Autoencoder‐Based Perceptual Image Hashing for Image Authentication
Hatami et al. An optimized robust and invisible digital image watermarking scheme in Contourlet domain for protecting rightful ownership
Jamali et al. Robust watermarking using diffusion of logo into auto-encoder feature maps
US20070270978A1 (en) Method for identifying marked content, such as by using a class-wise non-principal component approach
Dwivedi et al. Geometrically robust digital image watermarking based on Zernike moments and FAST technique
El Hajji et al. New image watermarking algorithm based on mixed scales wavelets
Yadav et al. Lagrangian twin support vector regression and genetic algorithm based robust grayscale image watermarking
Amiri et al. Increasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks.
Jabbar et al. Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit
CN111284157B (en) Commodity package anti-counterfeiting printing and verifying method based on fractional order steganography technology
Liu et al. Novel robust multiple watermarking against regional attacks of digital images
Naseem et al. Optimal secure information using digital watermarking and fuzzy rule base
Tripathi et al. Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images