skip to main content
article

A survey of RST invariant image watermarking algorithms

Published:06 July 2007Publication History
Skip Abstract Section

Abstract

In this article, we review the algorithms for rotation, scaling and translation (RST) invariant image watermarking. There are mainly two categories of RST invariant image watermarking algorithms. One is to rectify the RST transformed image before conducting watermark detection. Another is to embed and detect watermark in an RST invariant or semi-invariant domain. In order to help readers understand, we first introduce the fundamental theories and techniques used in the existing RST invariant image watermarking algorithms. Then, we discuss in detail the work principles, embedding process, and detection process of the typical RST invariant image watermarking algorithms. Finally, we analyze and evaluate these typical algorithms through implementation, and point out their advantages and disadvantages.

References

  1. Abdel-Aziz, B., Zhao, J., and Chouinard, J.-Y. 2004. On the limits of second generation watermarks. In Proceedings of the IEEE Canadian Conference on Computer and Robot Vision (CRV2004). IEEE Computer Society Press, Los Alamitos, CA, 209--216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Abu-Mostafa, Y. and Psaltis, D. 1984. Recognitive aspects of moment invariants. IEEE Trans. Patt. Anal. Mach. Intell. PAMI-6 6, 698--706.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alghoniemy, M. and Tewfik, A. H. 2000a. Geometric distortion correction in image watermarking. In Proceedings of SPIE: Security and Watermarking of Multimedia Contents. Vol. 3971. 82--89.Google ScholarGoogle ScholarCross RefCross Ref
  4. Alghoniemy, M. and Tewfik, A. H. 2000b. Image watermarking by moment invariants. In Proceedings of IEEE International Conference on Image Processing. Vol. 2. 73--76.Google ScholarGoogle Scholar
  5. Alghoniemy, M. and Tewfik, A. H. 2004. Geometric invariance in image watermarking. IEEE Trans. Image Proc. 13, 2, 145--153. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Alvarez-Rodriguez, M. and Perez-Gonzalez, F. 2002. Analysis of pilot-based synchronization algorithms for watermarking of still images. Signal Processing: Image Communication 17, 8 (Sept.), 611--633.Google ScholarGoogle ScholarCross RefCross Ref
  7. Barni, M. 2005. Effectiveness of exhaustive search and template matching against watermark desynchronization. IEEE Signal Processing Letters 12, 2 (Feb.), 158--161.Google ScholarGoogle ScholarCross RefCross Ref
  8. Bartolini, F., Barni, M., Cappellini, V., and Piva, A. 1998. Mask building for perceptually hiding frequency embedded watermarks. In Proceedings of the 5th IEEE International Conference on Image Processing (ICIP'98). IEEE Computer Society Press, Los Alamitos, CA, Vol. 1. 450--454.Google ScholarGoogle Scholar
  9. Bas, P., Chassery, J., and Macq, B. 2002. Geometrically invariant watermarking using feature points. IEEE Trans. Image Proc. 11, 9, 1014--1028. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bas, P., Chassery, J., and Macq, B. 2000. Robust watermarking based on the warping pre-defined triangular patterns. In Proceedings of SPIE 2000. (Jan.), 99--109.Google ScholarGoogle Scholar
  11. Bors, A. and Pitas, I. 1996. Image watermarking using DCT domian constraints. In Proceedings of IEEE International Conference on Image Processing. Vol. 2. IEEE Computer Society Press, Los Alamitos, CA, 231--234.Google ScholarGoogle Scholar
  12. Bracewell, R. 2000. The Fourier transform and its applications. McGraw Hill, Boston, MA, ISBN: 0073039381.Google ScholarGoogle Scholar
  13. Bruyndonckx, O., Quisquater, J. J., and Macq, B. 1995. Spatial method for copyright labeling of digital images. In Proceedings of the IEEE Workshop Nonlinear Signal and Image Processing. IEEE Computer Society Press, Los Alamitos, CA, 456--459.Google ScholarGoogle Scholar
  14. Brown, L. G. 1992. A survey of image registration techniques. ACM Computing Surveys 24, 4, 325--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Caldelli, R., Barni, M., and Piva, A. 2000. Geometric-invariant robust watermarking through constellation matching in the frequency domain. In Proceedings of the IEEE International Conference on Image Processing. Vol. 2. IEEE Computer Society Press, Los Alamitos, CA, 65--68.Google ScholarGoogle Scholar
  16. Chandran, V., Carswell, B., Boashash, B., and Elgar, S. L. 1997. Pattern recognition using invariants defined from higher order spectra: 2-D image inputs. IEEE Trans. Image Process. 6, 5, 703--712. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Chandran, V. and Elgar, S. L. 1993. Pattern recognition using invariants defined from higher order spectra-one-dimensional inputs. IEEE Trans. Signal Process. 41, 1, 205--213.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Checkmark. http://www.checkmark.com/.Google ScholarGoogle Scholar
  19. Cox, I., Kilian, J., Leighton, T., and Shamoon, T. 1996. Secure spread spectrum watermarking for images, audio and video. In Proceedings of the IEEE International Conference on Image Processing (ICIP-96). IEEE Computer Society Press, Los Alamitos, CA, 243--246.Google ScholarGoogle Scholar
  20. Cox, I., Kilian, J., Leighton, T., and Shamoon, T. 1997. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 12, 1673--1687. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Cox, I., Miller, M., and Bloom, J. 2002. Digital watermarking. Morgan-Kaufmann, San Francisco, CA, ISBN: 1-55860-714-5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Csurka, G., Deguillaume, F., O'Ruanaidh, J. J. K., and Pun, T. 1999. A Bayesian approach to affine transformation resistant image and video watermarking. In Proceedings of the International Workshop on Information Hiding. Vol. 2. 315--330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Dai, X. and Khorram, S. 1999. A feature-based image registration algorithm using improved chain-code representation combined with invariant moments. IEEE Transactions on Geoscience and Remote Sensing 37, 5, 2351--2362.Google ScholarGoogle ScholarCross RefCross Ref
  24. Deguillaume, F., Csurka, G., O'Ruanaidh, J. J. K., and Pun, T. 1999. Robust 3D DFT video watermarking. In Proceedings of IS&T/SPIE Electronic Imaging 99, 113--124.Google ScholarGoogle Scholar
  25. Depovere, G., Kalker, T., and Linnartz, J. 1998. Improved watermark detection using filtering before correlation. In Proceedings of the IEEE International Conference on Image Processing (ICIP). Vol. 1. IEEE Computer Society Press, Los Alamitos, CA, 430--434.Google ScholarGoogle Scholar
  26. Dittmann, J., Fiebig, T., and Steinmetz, R. 2000. New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP). In Proceedings of SPIE. 176--186.Google ScholarGoogle Scholar
  27. Dong, P., Brankov, J. G., Galatsanos, N., and Yang, Y. 2002. Geometric robust watermarking based on a new mesh model correction approach. In Proceedings of the IEEE International Conference on Image Processing. Vol. 3. IEEE Computer Society Press, Los Alamitos, CA, 493--496.Google ScholarGoogle Scholar
  28. Dong, P. and Galatsanos, N. P. 2002. Affine transformation resistant watermarking based on image normalization. In Proceedings of the IEEE International Conference on Image Processing. Vol. 3. IEEE Computer Society Press, Los Alamitos, CA, 489--492.Google ScholarGoogle Scholar
  29. Duric, Z., Johnson, N., and Jajodia, S. 1999. Recovering watermarks from images. In Informaion & Software Engineering Tech. Rep. ISE-TR-99-04.Google ScholarGoogle Scholar
  30. Farzam, M. and Shirani, S. 2001. A robust multimedia watermarking technique using Zernike transform. In Proceedings of the IEEE International Workshop Multimedia Signal Processing. IEEE Computer Society Press, Los Alamitos, CA, 529--534.Google ScholarGoogle Scholar
  31. Gonzalez, R. and Woods, R. 2002. Digital image processing. ISBN: 0-20-118075-8. Prentice Hall, Englewood, Cliffs, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Harris, C. and Stephen, M. 1988. A combined corner and edge detector. In Proceedings of the 4th Alvey Vision Conference. 147--151.Google ScholarGoogle Scholar
  33. Hearn, D. and Baker, M. 1997. Computer graphics. Prentice Hall, Englewood Cliffs, NJ, ISBN:0-13-530924-7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Herrigel, A., O'Ruanaidh, J. J. K., Petersen, H., Pereira, S., and Pun, T. 1998. Secure copyright protection techniques for digital images. In Proceedings of the International Workshop on Information Hiding. 169--190.Google ScholarGoogle Scholar
  35. Herrigel, A., Voloshynovskiy, S., and Rytsar, Y. 2001. The watermark template attack. In Proceedings of the SPIE Security and Watermarking of Multimedia Contents III. Vol. 4314. 394--405.Google ScholarGoogle Scholar
  36. Horner, J. and Gianino, P. 1984. Phase-only matched filter. Appl. Optics 23, 6, 812--816.Google ScholarGoogle ScholarCross RefCross Ref
  37. Hsu, C. T. and Tsai, Y. S. 2003. Video object watermarking by quadratic region decomposition and tessellation. Images and Recognition 9, 1 (Mar.).Google ScholarGoogle Scholar
  38. Hsu, Y. and Arsenault, H. 1982. Optical pattern recognition using circular harmonic expansion. Appl. Optics 21, 4012--4015.Google ScholarGoogle ScholarCross RefCross Ref
  39. Hu, M. 1962. Visual pattern recognition by moment invariants. IRE Trans. Inf. Theory IT-8, 8, 1409--1420.Google ScholarGoogle Scholar
  40. Kankanhalli, M. and Ramakrishman, R. 1998. Content based watermarking of images. Proceedings of ACM Multimedia, ACM, New York, 61--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Khotanzad, A. and Hong, Y. 1990. Invariant image recognition by Zernike moments. IEEE Trans. Patt. Anal. Mach. Intell. 12, 489--497. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Kim, H., Baek, Y., and Lee, H. 2003a. Rotation, scale and translation invariant image watermark using higher order spectra. Optica Eng. 42, 2, 340--349.Google ScholarGoogle ScholarCross RefCross Ref
  43. Kim, H., Baek, Y., Lee, H., and Suh, Y. 2003b. Watermark using Radon transform and bispectrum invariants. In Proceedings of IH 2002. Lecture Notes in Computer Science, vol. 2978. Springer-Verlag, New York, 145--159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Kim, B., Choi, J., and Park, K. 2004. RST-resistant image watermarking using invariant centroid and reordered Fourier-Mellin transform. In Proceedings of IWDW' 2003. Lecture Notes in Computer Science, vol. 2939. Springer-Verlag, New York, 370--381.Google ScholarGoogle Scholar
  45. Kim, H. and Kumar, B. V. 2004. Rotation-tolerant watermark detection using circular harmonic function correlation filter. In Digital Watermarking. Lecture Notes in Computer Science, vol. 2939. Springer-Verlag, New York, 263--276.Google ScholarGoogle Scholar
  46. Kim, H. S. and Lee, H.-K. 2003. Invariant image watermark using Zernike moments. IEEE Trans. Circ. Syst. Video Tech. 13, 8, 766--775. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Koch, E. and Zhao, J. 1995. Towards robust and hidden image copyright labeling. In Proceedings of the IEEE Workshop on Nonlinear Signal and Image Processing. IEEE Computer Society Press, Los Alamitos, CA, 452--455.Google ScholarGoogle Scholar
  48. Kuglin, C. and Hines, D. 1975. The phase correlation image alignment method. In Proceedings of the IEEE 1975 International Conference on Cybernetrics and Society. IEEE Computer Society Press, Los Alamitos, CA, 163--165.Google ScholarGoogle Scholar
  49. Kumar, B., Mahalanobis, A., and Takessian, A. 2000. Optimal tradeoff circular harmonic function correlation filter methods providing controlled in-plane rotation response. IEEE Trans. Image Process. 9, 6, 1025--1034. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Kundur, D. and Hatzinakos, D. 1997. A robust digital image watermarking method using wavelet based fusion. In Proceedings of the IEEE International Conference on Image Processing. Vol. 1. IEEE Computer Society Press, Los Alamitos, CA, 544--547. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Kundur, D. and Hatzinakos, D. 1999. Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87. 1167--1179.Google ScholarGoogle Scholar
  52. Kurah, C. and McHughes, J. 1992. A cautionary note on image downgrading. In Proceedings of the IEEE Computer Security Applications Conference. Vol. 2. IEEE Computer Society Press, Los Alamitos, CA, 153--159.Google ScholarGoogle Scholar
  53. Kutter, M. 1998. Watermarking resisting to translation, rotation and scaling. In Proceedings of the SPIE: Multimedia Systems and Applications. Vol. 3528, (Nov.). 423--431.Google ScholarGoogle Scholar
  54. Kutter, M., Bhattacharjee, S., and Ebrahimi, T. 1999. Towards second generation watermarking schemes. In Proceedings of the IEEE International Conference on Image Processing '99. Vol. I. IEEE Computer Society Press, Los Alamitos, CA, 320--323.Google ScholarGoogle Scholar
  55. Kutter, M., Voloshynovskiy, S., and Herrigel, A. 2000. The watermark copy attack. In Proceedings of Electronic Imaging 2000, Security and Watermarking of Multimedia Content II. Vol. 3971.Google ScholarGoogle Scholar
  56. Lin, C., Wu, M., Bloom, J., Cox, I., Miller, M., and Lui, Y. 2001. Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process. 10, 5, 767--782. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Linnartz, J., Kaler, T., Depovere, G., and Beuker, R. 1997. A reliability model for the detection of electronic watermarks in digital images. In Proceedings of the IEEE Fifth Symposium on Communication and Vehicular Technology. IEEE Computer Society Press, Los Alamitos, CA, 202--209.Google ScholarGoogle Scholar
  58. Liu, Y. and Zhao, J. 2003. A new filtering method for RST invariant image watermarking. In Proceedings of the IEEE International Workshop on Haptic, Audio and Visual Environments and Their Applications. IEEE Computer Society Press, Los Alamitos, CA, 101--106.Google ScholarGoogle Scholar
  59. Liu, Y. and Zhao, J. 2004a. A rectification scheme for RST invariant image watermarking. In Proceedings of the Canadian Conference on Electrical and Computer Engineering. 527--530.Google ScholarGoogle Scholar
  60. Liu, Y. and Zhao, J. 2004b. Rotation, scaling, and translation invariant image watermarking based on Radon transform. In Proceedings of the Canadian Conference on Computer and Robot Vision. 225--232. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Liu, Y., Zheng, D., and Zhao, J. 2005. A rectification scheme for RST invariant image watermarking. IEICE Trans. Fundament. (Special Section on Cryptography and Information Security) E88-A, 1.Google ScholarGoogle Scholar
  62. Lu, C. S., Liao, H. Y., and Kutter, M. 2002. Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector. IEEE Trans. Image Process. 11, 3, 280--292. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Maes, M., Kalker, T., Linnartz, J., Talstra, J., Depovere, G., and Haitsma, J. 2000. Digital watermarking for DVD video copy protection. IEEE Signal Processing Magazine, 47--57.Google ScholarGoogle Scholar
  64. Merhav, N. 2005. An information-theoretic view of watermark embedding-detection and geometric attacks. In Proceedings of WaCha 05, (Barcelona, Spain).Google ScholarGoogle Scholar
  65. Mihcak, M. K., Kozintsev, I., and Ramchandran, K. 1999. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). Vol. 6. IEEE Computer Society Press, Los Alamitos, CA, 3253--3256. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Moulin, P. 2002. A mathematical approach to watermarking and data hiding. In ICASSP Tutorial.Google ScholarGoogle Scholar
  67. Natarajan, B. K. 1995. Filtering random noise from deterministic signals via data compression. IEEE Trans. Signal Process. 43, 11, 2595--2605. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Oppenheim, A. and Lim, J. 1981. Importance of phase in signals. Proc. IEEE 69, 529--541.Google ScholarGoogle ScholarCross RefCross Ref
  69. O'Ruanaidh, J., Dowling, W., and Boland, F. 1995. Watermarking digital images for copyright protection. In Proceedings of the IEEE International Conference on Vision, Image and Signal Processing. IEEE Computer Society Press, Los Alamitos, CA, 250--256.Google ScholarGoogle Scholar
  70. O'Ruanaidh, J., Dowling, W., and Boland, F. 1996. Phase watermarking of digital images. In Proceedings of the IEEE International Conference on Image Processing. IEEE Computer Society Press, Los Alamitos, CA, 239--242.Google ScholarGoogle Scholar
  71. O'Ruanaidh, J. and Pun, T. 1998. Rotation, scale, and translation invariant digital image watermarking. Signal Process. 66, 3, 303--317. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Pawlak, M. and Xin, Y. 2002. Robust image watermarking: an invariant domain approach. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). Vol. 2. IEEE Computer Society Press, Los Alamitos, CA, 885--888.Google ScholarGoogle Scholar
  73. Pereira, S., O'Ruanaidh, J., and Deguillaume, F. 1999. Template based recovery of Fourier-based watermarks using log-polar and log-log maps. In Proceedings of the IEEE International Conference on Multimedia Computing and System. IEEE Computer Society Press, Los Alamitos, CA, Vol. 1. 870--874. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Pereira, S. and Pun, T. 2000. Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process. 9, 6, 1123--1129. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Pickholtz, R., Schilling, D., and Milstein, L. 1982. Theory of spread spectrum communications---a tutorial. IEEE Trans. Commun. 30, 5, 855--884.Google ScholarGoogle ScholarCross RefCross Ref
  76. Prudyus, I., Voloshynovskiy, S., and Synyavskyy, A. 2001. Wavelet-based MAP image denoising using provably better class of stochastic i.i.d. image models. In Proceedings of the 5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service. Vol. 2. 583--586.Google ScholarGoogle Scholar
  77. Refregier, P. 1991. Optimal trade-off filters for noise robustness, sharpness of the correlation peak, and Horner efficiency. Optics Lett. 16, 11, 829--832.Google ScholarGoogle ScholarCross RefCross Ref
  78. Sadler, B. 1989. Shift and rotation invariant object recognition using the bispectrum. In Proceedings of the Workshop on Higher Order Spectral Analysis. 106--111.Google ScholarGoogle ScholarCross RefCross Ref
  79. Simitopoulos, D., Koutsonanos, D. E., and Strintzis, M. G. 2002. Image watermarking resistant to geometric attacks using generalized Radon transformations. In Proceedings of DSP 2002. Vol. 1. 85--88.Google ScholarGoogle Scholar
  80. Simitopoulos, D., Koutsonanos, D. E., and Strintzis, M. G. 2003. Robust image watermarking based on generalized Radon transformations. IEEE Trans. Circ. Syst. Video Tech. 13, 8, 732--745. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Stirmark. http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark.Google ScholarGoogle Scholar
  82. Sun, Q., Wu, J., and Deng, R. 1999. Recovering modified watermarked image with reference to original image. In Proceedings of SPIE. 415--424.Google ScholarGoogle Scholar
  83. Tang, C. W. and Hang, H. M. 2003. A feature-based robust digital image watermarking scheme. IEEE Trans. Sig. Process. 51, 4 (April), 950--959. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Teh, C.-H. and Chin, R. T. 1988. On image analysis by the method of moments. IEEE Trans. Patt. Anal. Mach. Intell. 10, 4, 496--513. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Tirkel, A., Rankin, G., Schyndel, R. V., Ho, W., Mee, N., and Osborne, C. 1993. Electronic watermark. In Proceedings of DICTA. 666--672.Google ScholarGoogle Scholar
  86. Vijaya Kumar, B. V. K., Mahalanobis, A., and Takessian, A. 2000. Optimal tradeoff circular Harmonic function correlation filter methods providing in-plane rotation response. IEEE Trans. Image Proc. 9, 6, 1025--1034. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Voloshynovskiy, S., Deguillaume, F., and Pun, T. 2001. Multibit digital watermarking robust against local nonlinear geometrical distortions. In Proceedings of the IEEE International Conference on Image Processing (ICIP). IEEE Computer Society Press, Los Alamitos, CA, 999--1002.Google ScholarGoogle Scholar
  88. Voloshynovskiy, S., Deguillaume, F., and Pun, T. 2000a. Content adaptive watermarking based on a stochastic multiresolution image modeling. In Proceedings of EUSIPCO2000, X Europian Signal Processing Conference.Google ScholarGoogle Scholar
  89. Voloshynovskiy, S., Herrigel, A., Baumgartner, N., and Pun, T. 1999. A stochastic approach to content adaptive digital image watermarking. In Proceedings of the 3rd International Workshop on Information Hiding. Vol. 1768. 211--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. Voloshynovskiy, S., Pereira, S., Herrigel, A., Baumgartner, N., and Pun, T. 2000b. Generalized watermark attack based on watermark estimation and perceptual remodulation. In Proceedings of Electronic Imaging 2000: Security and Watermarking of Multimedia Content. Vol. 3971.Google ScholarGoogle Scholar
  91. Xin, Y., Liao, S., and Pawlak, M. 2004. Geometrically robust image watermarking via pseudo Zernike momens. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE Computer Society Press, Los Alamitos, CA., 939--942.Google ScholarGoogle Scholar
  92. Yao, J. P. and Chin, L. 1999. Power-adjusted fractional power radial harmonic filters for shift- and scale-invariant pattern recognition with improved noise robustness and discrimination. Optics Commun. 162, 1--3, 26--30.Google ScholarGoogle ScholarCross RefCross Ref
  93. Yao, J. P. and Lebreton, G. 1998. Scale-invariant correlation with truncated phase-only radial harmonic Fitlers. Optics Commun. 145, 1--6, 213--219.Google ScholarGoogle ScholarCross RefCross Ref
  94. Young, D. 2000. Straight lines and circles in the log-polar image. In BMVC2000: Proceedings of the 11th British Machine Vision Conference. 426--435.Google ScholarGoogle ScholarCross RefCross Ref
  95. Zhao, J., Hayasaka, R., Muranoi, R., Ito, M., and Matsushita, Y. 2000. A video copyright protection system based on contentID. IEICE Trans. Inf. Syst. E83-D, 12, 2131--2141.Google ScholarGoogle Scholar
  96. Zheng, D. and Zhao, J. 2003a. LPM-based RST invariant digital image watermarking. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE Computer Society Press, Los Alamitos, CA, 1951--1954.Google ScholarGoogle Scholar
  97. Zheng, D. and Zhao, J. 2003b. RST invariant digital image watermarking: importance of phase information. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE Computer Society Press, Los Alamitos, CA, 785--788.Google ScholarGoogle Scholar
  98. Zheng, D., Zhao, J., and Saddik, A. EL. 2003a. RST invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE Trans. Circ. Syst. Video Tech. 13, 753--765. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Zheng, D., Zhao, J., Tam, W., and Speranza, F. 2003b. Image quality measurement by using digital watermarking. In Proceedings of the IEEE International Workshop on Haptic, Audio and Visual Environments and their Applications. IEEE Computer Society Press, Los Alamitos, CA, 65--70.Google ScholarGoogle Scholar

Index Terms

  1. A survey of RST invariant image watermarking algorithms

      Recommendations

      Reviews

      Suya You

      Existing digital watermarking techniques are systematically reviewed in this paper, with a special focus on rotation, scaling, and translation (RST) invariant image watermarking algorithms. The RST invariant-based approach has recently demonstrated its effectiveness in performance and robustness against various geometrical transformations and image degradations. The paper comprehensively covers existing algorithms and provides a detailed performance analysis. The authors did a good job in structuring and organizing the content, which made the paper very readable. My only concern is with Section 2, “Fundamental Theories and Techniques,” which seems too long (17 pages). It basically reviews very fundamental image processing knowledge that could be easily found in any image processing textbook; I assume that readers interested in this paper already have such knowledge. Also, it would have been nice if the authors had included a section at the end to comment on future work and possible research directions in this area (according to their findings and experiences in this domain). Overall, this is a very good and comprehensive survey paper—I highly recommend it. Online Computing Reviews Service

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader