Content-based synchronization using the local invariant feature for robust watermarking

Cited 2 time in webofscience Cited 0 time in scopus
  • Hit : 309
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, HYko
dc.contributor.authorKim, JTko
dc.contributor.authorLee, Heung-Kyuko
dc.contributor.authorSuh, YHko
dc.date.accessioned2013-03-06T15:28:45Z-
dc.date.available2013-03-06T15:28:45Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2005-
dc.identifier.citationINFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.122 - 134-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/87425-
dc.description.abstractThis paper addresses the problem of content-based synchronization for robust watermarking. Synchronization is a process of extracting the location to embed and detect the signature, copyright information, so that it is crucial for the robustness of the watermarking system. In this paper, we will review representative content-based approaches and propose a new synchronization method based on the scale invariant feature transform. In content-based synchronization approaches, it is important to extract robust features even with image distortions and we suspect that the consideration of local image characteristics will be helpful. The scale invariant feature transform regards these characteristics and is invariant to noise, spatial filtering, geometric distortions, and illumination changes of the image. Through experiments, we will compare the proposed method with representative content-based approaches and show the appropriateness for robust watermarking.-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.titleContent-based synchronization using the local invariant feature for robust watermarking-
dc.typeArticle-
dc.identifier.wosid000227471900011-
dc.identifier.scopusid2-s2.0-23944432883-
dc.type.rimsART-
dc.citation.volume3325-
dc.citation.beginningpage122-
dc.citation.endingpage134-
dc.citation.publicationnameINFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE-
dc.contributor.localauthorLee, Heung-Kyu-
dc.contributor.nonIdAuthorLee, HY-
dc.contributor.nonIdAuthorKim, JT-
dc.contributor.nonIdAuthorSuh, YH-
dc.type.journalArticleArticle; Proceedings Paper-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 2 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0