Article ID Journal Published Year Pages File Type
531867 Pattern Recognition 2007 13 Pages PDF
Abstract

This paper presents a novel image watermark scheme based on the characteristics of amplitude attacks. First of all, the analysis of amplitude attacks is performed. Then the amplitude attacks are categorized into three types: positive attack, negative attack and random attack. Finally, based on these attack types, we design three corresponding detectors. The detectors remove the unreliable discrete cosine transform (DCT) coefficients in the attacked image so that only reliable coefficients are used for the extraction of the watermark embedded. The experimental results indicate that the proposed technique improves robustness significantly without sacrificing the false alarm rate.

Related Topics
Physical Sciences and Engineering Computer Science Computer Vision and Pattern Recognition
Authors
, ,