Evaluation of Feature Extraction Techniques for Robust Watermarking

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 411
  • Download : 4
DC FieldValueLanguage
dc.contributor.authorLee, Hae-Yeoun-
dc.contributor.authorKang, In Koo-
dc.contributor.authorLee, Heung-Kyu-
dc.contributor.authorSuh, Young-Ho-
dc.date.accessioned2010-03-16T02:44:19Z-
dc.date.available2010-03-16T02:44:19Z-
dc.date.issued2005-09-
dc.identifier.citationLecture Notes in Computer Science, Vol.3710, pp. 418-431en
dc.identifier.isbn978-3-540-28768-1-
dc.identifier.issn1611-3349-
dc.identifier.urihttp://hdl.handle.net/10203/17169-
dc.description.abstractThis paper addresses feature extraction techniques for robust watermarking. Geometric distortion attacks desynchronize the location of the inserted watermark and hence prevent watermark detection. Watermark synchronization, which is a process of finding the location for watermark insertion and detection, is crucial to design robust watermarking. One solution is to use image features. This paper reviews feature extraction techniques that have been used in featurebased watermarking: the Harris corner detector and the Mexican Hat wavelet scale interaction method. We also evaluate the scale-invariant keypoint extractor in comparison with other techniques in aspect of watermarking. After feature extraction, the set of triangles is generated by Delaunay tessellation. These triangles are the location for watermark insertion and detection. Redetection ratio of triangles is evaluated against geometric distortion attacks as well as signal processing attacks. Experimental results show that the scale-invariant keypoint extractor is appropriate for robust watermarking.en
dc.language.isoen_USen
dc.publisherSpringer Verlag (Germany)en
dc.titleEvaluation of Feature Extraction Techniques for Robust Watermarkingen
dc.typeArticleen
dc.identifier.doi10.1007/11551492_32-

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0