• 沒有找到結果。

Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Peak Detection and Synchronization in Discrete Fourier Transform Domain

N/A
N/A
Protected

Academic year: 2022

Share "Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Peak Detection and Synchronization in Discrete Fourier Transform Domain"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Peak Detection and Synchronization in

Discrete Fourier Transform Domain 作者: Yen-Chung Chiu

Wen-Hsiang Tsai 貢獻者: Asia University

日期: 2004

上傳時間: 2009-10-23T07:30:43Z

摘要: A watermarking method for copyright protection of color images against rotation and scaling attacks is proposed. A watermark is embedded in an input image as coefficient-value peaks circularly and symmetrically distributed in a middle band of the

discrete Fourier transform (DFT) domain of the input image. By detecting the peaks in the DFT domain of the resulting stego-image, the

embedded watermark can be extracted for copyright proof, even after the stego-image is attacked by rotation and rescaling.

Experimental results showing the effectiveness of the proposed method are also included.

參考文獻

相關文件

Using a one-factor higher-order item response theory (HO-IRT) model formulation, it is pos- ited that an examinee’s performance in each domain is accounted for by a

• Many-body physics is essential for sub-keV detectors of neutrinos and dark matter. • High-quality many-body calculations can substantially reduce

• Emergent Z_k 1-form & 2-form symmetry. BF theory

– Sonic black hole and Hawking radiation and Unruh effect – Quantum criticality and AdS-CFT correspondance. Discrete

[7] C-K Lin, and L-S Lee, “Improved spontaneous Mandarin speech recognition by disfluency interruption point (IP) detection using prosodic features,” in Proc. “ Speech

• A formal usage policy and procedures should be in place, and appropriate security measures should be adopted to protect against the risks of using mobile computing and

Tekalp, “Frontal-View Face Detection and Facial Feature Extraction Using Color, Shape and Symmetry Based Cost Functions,” Pattern Recognition Letters, vol.. Fujibayashi,

As we shall see in Section 30.2, if we choose “complex roots of unity” as the evaluation points, we can produce a point-value representation by taking the discrete Fourier transform