TY - GEN
T1 - Geometrically invariant image watermarking in the DWT domain
AU - Xiang, Shijun
AU - Kim, Hyoung Joong
PY - 2007
Y1 - 2007
N2 - Watermark resistance to both geometric attacks and lossy compressions is a fundamental issue in the image watermarking community. In this paper, we propose a DWT (Discrete Wavelet Transform) based watermarking scheme for such a challenging problem. Watermark resistance to geometric deformations is achieved by using the invariance of the histogram shape. In both theoretical analysis and experimental way, we show that the invariance can be extended to the DWT domain thanks to the time-frequency localization property of DWT. Consequently, we achieve the goal to embed a geometrically invariant watermark into the low-frequency sub-band of DWT in such a way that the watermark is not only invariant to various geometric transforms, but also robust to common image processing operations. Extensive simulation results demonstrate the superiority of the proposed watermark strategy due to the use of the histogram shape invariance combined with the DWT technique.
AB - Watermark resistance to both geometric attacks and lossy compressions is a fundamental issue in the image watermarking community. In this paper, we propose a DWT (Discrete Wavelet Transform) based watermarking scheme for such a challenging problem. Watermark resistance to geometric deformations is achieved by using the invariance of the histogram shape. In both theoretical analysis and experimental way, we show that the invariance can be extended to the DWT domain thanks to the time-frequency localization property of DWT. Consequently, we achieve the goal to embed a geometrically invariant watermark into the low-frequency sub-band of DWT in such a way that the watermark is not only invariant to various geometric transforms, but also robust to common image processing operations. Extensive simulation results demonstrate the superiority of the proposed watermark strategy due to the use of the histogram shape invariance combined with the DWT technique.
UR - http://www.scopus.com/inward/record.url?scp=38549089602&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38549089602&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-77535-5_6
DO - 10.1007/978-3-540-77535-5_6
M3 - Conference contribution
AN - SCOPUS:38549089602
SN - 354077534X
SN - 9783540775348
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 76
EP - 90
BT - Information Security Applications - 8th International Workshop, WISA 2007, Revised Selected Papers
PB - Springer Verlag
T2 - 8th International Workshop on Information Security Applications, WISA 2007
Y2 - 27 August 2007 through 29 August 2007
ER -