The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Dalam makalah ini, kami mencadangkan kaedah penanda air baharu yang menyebarkan corak ID dengan jujukan tertentu dan membenamkannya ke seluruh domain spatial imej. Satu set jujukan ialah kunci untuk mengekstrak corak ID. Memandangkan corak ID tersebar di seluruh imej, kita boleh mengekstrak corak ID daripada bahagian imej, iaitu imej terpotong. Kami juga boleh mengesahkan ketulenan dengan mengekstrak corak ID yang sama daripada beberapa bahagian imej. Kaedah yang dicadangkan adalah teguh kepada StirMark, yang merupakan alat penanda aras untuk menguji keteguhan imej bertanda air, serta gangguan oleh penambahan hingar dan operasi pemprosesan imej biasa seperti peningkatan tepi, penukaran kontras kecerahan, posterisasi, penapisan Gauss, penapisan median , pembetulan gamma, pemampatan JPEG dan keratan.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Akira SHIOZAKI, Jiro TANIMOTO, Motoi IWATA, "A Digital Image Watermarking Scheme Withstanding Malicious Attacks" in IEICE TRANSACTIONS on Fundamentals,
vol. E83-A, no. 10, pp. 2015-2022, October 2000, doi: .
Abstract: In this paper, we propose a new watermarking method which spreads an ID pattern with specific sequences and embeds it throughout the spatial domain of an image. A set of the sequences is a key for extracting the ID pattern. As an ID pattern is spread throughout an image, we can extract the ID pattern from a part of the image, that is a clipped image. We can also confirm authenticity by extracting the same ID pattern from several parts of an image. The proposed method is robust to StirMark, which is a benchmark tool to test robustness of watermarked images, as well as disturbance by noise addition and common image processing operations such as edge-enhancement, brightness-contrast conversion, posterization, Gauss filtering, median filtering, gamma correction, JPEG compression and clipping.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e83-a_10_2015/_p
Salinan
@ARTICLE{e83-a_10_2015,
author={Akira SHIOZAKI, Jiro TANIMOTO, Motoi IWATA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A Digital Image Watermarking Scheme Withstanding Malicious Attacks},
year={2000},
volume={E83-A},
number={10},
pages={2015-2022},
abstract={In this paper, we propose a new watermarking method which spreads an ID pattern with specific sequences and embeds it throughout the spatial domain of an image. A set of the sequences is a key for extracting the ID pattern. As an ID pattern is spread throughout an image, we can extract the ID pattern from a part of the image, that is a clipped image. We can also confirm authenticity by extracting the same ID pattern from several parts of an image. The proposed method is robust to StirMark, which is a benchmark tool to test robustness of watermarked images, as well as disturbance by noise addition and common image processing operations such as edge-enhancement, brightness-contrast conversion, posterization, Gauss filtering, median filtering, gamma correction, JPEG compression and clipping.},
keywords={},
doi={},
ISSN={},
month={October},}
Salinan
TY - JOUR
TI - A Digital Image Watermarking Scheme Withstanding Malicious Attacks
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2015
EP - 2022
AU - Akira SHIOZAKI
AU - Jiro TANIMOTO
AU - Motoi IWATA
PY - 2000
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E83-A
IS - 10
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - October 2000
AB - In this paper, we propose a new watermarking method which spreads an ID pattern with specific sequences and embeds it throughout the spatial domain of an image. A set of the sequences is a key for extracting the ID pattern. As an ID pattern is spread throughout an image, we can extract the ID pattern from a part of the image, that is a clipped image. We can also confirm authenticity by extracting the same ID pattern from several parts of an image. The proposed method is robust to StirMark, which is a benchmark tool to test robustness of watermarked images, as well as disturbance by noise addition and common image processing operations such as edge-enhancement, brightness-contrast conversion, posterization, Gauss filtering, median filtering, gamma correction, JPEG compression and clipping.
ER -