PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Hiding Digital Watermarks Using Fractal Compression Technique

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper proposes a fractal-based watermarking scheme that efficiently protects the intellectual property rights of digital images. The main feature of fractal encoding is that it uses the self-similarity between the larger and smaller parts of an image to compress the image. When our scheme uses this self-similar relationship, it effects both the embedding and extraction of the watermark. As seen from the experimental results, the proposed scheme provides more robust capability than other compression-based watermarking techniques.
Wydawca
Rocznik
Strony
189--202
Opis fizyczny
Bibliogr. 22 poz., fot., wykr.
Twórcy
autor
  • Department of Information Management, National Taichung Institute of Technology, Taichung, Taiwan 404, R.O.C.
autor
  • Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan, 621, R.O.C.
Bibliografia
  • [Barnsley, 1988] Barnsley, M. F. (1988). Fractals Everywhere, Academic Press.
  • [Barnsley et al., 1993] Barnsley, M. F. and Hurd, L. P. (1993). Fractal Image Compression. AK Peters, Ltd.,Wellesley.
  • [Bender et al., 1996] Bender, W., D. Gruhl, N. Morimoto and Lu, A. (1996). Techniques for Data Hiding. IBM System Journal, 35(3), 313-336.
  • [Bors et al., 1996] Bors, A. G. and Pitas, I. (1996). Image Watermarking Using DCT Domain Constraint, IEEE International Conference on Image Processing (ICIP’96), 3, 231-234.
  • [Chang et al., 2000a] Chang, C. C. and Hwang, K. F. (2000). A Digital Watermark Scheme Using Human Visual Effects. International Journal of Computing and Informatica, 24(4).
  • [Chang et al., 2000b] Chang, C. C., Chung, P. F. and Chen, T. S. (2000). A Technique for Copyright Protection of Digital Images Based upon (t, n)-Threshold Scheme. International Journal of Computing and Informatica, 24(1).
  • [Chang et al., 2000c] Chang, C. C. and Tsai, C. S. (2000). A Technique for Computing Watermarks from Digital Images. International Journal of Computing and Informatica, 24(3), 391-396.
  • [Cox et al., 1997] Cox, I. J., Kilian, J.,Leighton, T. and Shamoon, T. (1997). Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing, 6(12), 1073-1687.
  • [Cox et al., 1998] Cox, I. J. and Linnartz, J. P. M. G. (1998). Some General Methods for Tampering with Watermarks . IEEE Journal on Selected Areas in Communications, 6(4), 587-593.
  • [Craver et al., 1998] Craver, S., Memon, N., Yeo, B. L. and Yeung, M. M. (1998). Some General Methods for Tampering with Watermarks. IEEE Journal on Selected Areas in Communications, 16(4), 573-586.
  • [Darmstaedter et al., 1998] Darmstaedter, V., Delaigle, J.-F., Quisquater, J. J. and Macq, B. (1998), Low Cost Spatial Watermarking. Comput. and Graphics, 22(4), 417-424.
  • [Hsu et al., 1999] Hsu, C. T. and Wu, J. L. (1999). Hidden Digital Watermarks in Images. IEEE Transactions on Image Processing, 8(1), 58-68.
  • [Hwang et al., 1999] Hwang, M. S., Chang, C. C. and Hwang, K. F. (1999). A Watermarking Technique Based on One-way Hash Functions. IEEE Transactions on Consumer Electronics, 45(2), 286-294.
  • [Jacquin, 1992] Jacquin, A. E. (1992). Image Coding Based on a Fractal Theory of Iterated Contractive Image Transformations. IEEE transactions on Image Processing, 1(1), 18-30.
  • [Kutter et al., 1998] Kutter, M., Jordan, F. and Bossen, F. (1998). Digital Watermarking of Color Images Using Amplitude Modulation. Journal of Electronic Imaging, 7(2), 326-332.
  • [Lu et al., 2000] Lu, Z. M, Pan, J. S. and Sun, S. H. (2000). VQ-based Digital Image Watermarking Method. Electronic Letters, 7(2), 1201-1202.
  • [Makur et al., 2001] Makur, A. and Selvi, S. S. (2001). Variable Dimension Vector Quantization Based Image Watermarking. Signal Processing, 81, 889-893.
  • [Puate et al., 1996] Puate, J. and Jordan, F. (1996). Using Fractal Compression Scheme to Embed a Signature into an Image. Proceedings of the SPIE Photonics East’96 Symposium, 108-118.
  • [Swason et al., 1998] Swason, M. D., Kobayashi, M. and Tewfik, A. H. (1998). Multimedia Data Embedding and Watermarking Technologies. Proceedings of IEEE, 86(6), 1064-1087.
  • [Voyatzis et al., 1999] Voyatzis, G. and Pitas, I. (1999). Protecting Digital-Image Copyrights: A Framework. IEEE Computer Graphics and Applications, 1, 18-24.
  • [Wolfgang et al., 1996] Wolfgang, R. B. and Delp, E. J. (1996). A Watermark for Digital Image. Proceedings of the 1996 International Conference on Image Processing Lausanne, Switzerland, 219-222.
  • [Zhao et al., 2000] Zhao, Y., Ma, Q. and Yuan, B. (2000). Digital Watermark Based on LIFS. Proceedings of the IEEE International Conference on Image Processing ICIP’00, 1281-1284.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0004-0168
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.