Digital watermarking method for image feature point extraction and analysis

Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on fea...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of intelligent systems 2022-10, Vol.37 (10), p.7281-7299
Hauptverfasser: Shan, Chun, Zhou, Siyi, Zhang, Ziyi, Li, Mianjie
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 7299
container_issue 10
container_start_page 7281
container_title International journal of intelligent systems
container_volume 37
creator Shan, Chun
Zhou, Siyi
Zhang, Ziyi
Li, Mianjie
description Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on feature extraction, since the feature points themselves are robust as strong corner points in the images. We will perform specific practical applications in information‐hiding scenarios, such as ticket anticounterfeiting, copyright protection, tampering hints, and covert marking. As a result, while assuring the accuracy of hidden data, assault resistance must also be addressed. In this paper, a strategy for watermark embedding utilizing image feature points is proposed. In principle, the embedding and extraction of digital watermarks are achieved in the transform domain by discrete wavelet transform processing to make digital images more robust than before. The effectiveness of the algorithm is analyzed by experimental data, in which different wavelet bases are used. To check the robustness of the watermarking algorithm, various attacks are performed on watermarked images.
doi_str_mv 10.1002/int.22881
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2706177197</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2706177197</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3321-796dcecea708909e9c164c08f3f17c4f589d8cd649a6d4ca729f3f01ca9212b73</originalsourceid><addsrcrecordid>eNp1kE9PAyEQxYnRxFo9-A1IPHnYlmG3CxxN_dfY6KUm3giyUKnbpQJN7beXul49TOYwv5l57yF0CWQEhNCx69KIUs7hCA2ACF4AwNsxGhDOq4IDK0_RWYwrQgBYNRmgp1u3dEm1eKeSCWsVPl23xGuTPnyDrQ_YrdXSYGtU2gaDNz4_wOY7BaWT8x1WXZNLtfvo4jk6saqN5uKvD9Hr_d1i-ljMXx5m05t5ocuSQsFE3WijjWKECyKM0FBXmnBbWmC6shMuGq6buhKqbiqtGBV5REArQYG-s3KIrvq7m-C_tiYmufLbkEVESRmpgTEQB-q6p3TwMQZj5SZkM2EvgchDVjJbkb9ZZXbcszvXmv3_oJw9L_qNH8Fva5c</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2706177197</pqid></control><display><type>article</type><title>Digital watermarking method for image feature point extraction and analysis</title><source>Access via Wiley Online Library</source><creator>Shan, Chun ; Zhou, Siyi ; Zhang, Ziyi ; Li, Mianjie</creator><creatorcontrib>Shan, Chun ; Zhou, Siyi ; Zhang, Ziyi ; Li, Mianjie</creatorcontrib><description>Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on feature extraction, since the feature points themselves are robust as strong corner points in the images. We will perform specific practical applications in information‐hiding scenarios, such as ticket anticounterfeiting, copyright protection, tampering hints, and covert marking. As a result, while assuring the accuracy of hidden data, assault resistance must also be addressed. In this paper, a strategy for watermark embedding utilizing image feature points is proposed. In principle, the embedding and extraction of digital watermarks are achieved in the transform domain by discrete wavelet transform processing to make digital images more robust than before. The effectiveness of the algorithm is analyzed by experimental data, in which different wavelet bases are used. To check the robustness of the watermarking algorithm, various attacks are performed on watermarked images.</description><identifier>ISSN: 0884-8173</identifier><identifier>EISSN: 1098-111X</identifier><identifier>DOI: 10.1002/int.22881</identifier><language>eng</language><publisher>New York: Hindawi Limited</publisher><subject>Algorithms ; Digital imaging ; Digital watermarking ; Digital watermarks ; Discrete Wavelet Transform ; Embedding ; Feature extraction ; information hiding ; information security ; Intelligent systems ; Multimedia ; Robustness ; second‐level wavelet decomposition ; wavelet transform ; Wavelet transforms</subject><ispartof>International journal of intelligent systems, 2022-10, Vol.37 (10), p.7281-7299</ispartof><rights>2022 Wiley Periodicals LLC</rights><rights>2022 Wiley Periodicals LLC.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3321-796dcecea708909e9c164c08f3f17c4f589d8cd649a6d4ca729f3f01ca9212b73</citedby><cites>FETCH-LOGICAL-c3321-796dcecea708909e9c164c08f3f17c4f589d8cd649a6d4ca729f3f01ca9212b73</cites><orcidid>0000-0001-7830-0108 ; 0000-0003-4925-6085 ; 0000-0002-0807-478X ; 0000-0001-8509-6264</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fint.22881$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fint.22881$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27924,27925,45574,45575</link.rule.ids></links><search><creatorcontrib>Shan, Chun</creatorcontrib><creatorcontrib>Zhou, Siyi</creatorcontrib><creatorcontrib>Zhang, Ziyi</creatorcontrib><creatorcontrib>Li, Mianjie</creatorcontrib><title>Digital watermarking method for image feature point extraction and analysis</title><title>International journal of intelligent systems</title><description>Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on feature extraction, since the feature points themselves are robust as strong corner points in the images. We will perform specific practical applications in information‐hiding scenarios, such as ticket anticounterfeiting, copyright protection, tampering hints, and covert marking. As a result, while assuring the accuracy of hidden data, assault resistance must also be addressed. In this paper, a strategy for watermark embedding utilizing image feature points is proposed. In principle, the embedding and extraction of digital watermarks are achieved in the transform domain by discrete wavelet transform processing to make digital images more robust than before. The effectiveness of the algorithm is analyzed by experimental data, in which different wavelet bases are used. To check the robustness of the watermarking algorithm, various attacks are performed on watermarked images.</description><subject>Algorithms</subject><subject>Digital imaging</subject><subject>Digital watermarking</subject><subject>Digital watermarks</subject><subject>Discrete Wavelet Transform</subject><subject>Embedding</subject><subject>Feature extraction</subject><subject>information hiding</subject><subject>information security</subject><subject>Intelligent systems</subject><subject>Multimedia</subject><subject>Robustness</subject><subject>second‐level wavelet decomposition</subject><subject>wavelet transform</subject><subject>Wavelet transforms</subject><issn>0884-8173</issn><issn>1098-111X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp1kE9PAyEQxYnRxFo9-A1IPHnYlmG3CxxN_dfY6KUm3giyUKnbpQJN7beXul49TOYwv5l57yF0CWQEhNCx69KIUs7hCA2ACF4AwNsxGhDOq4IDK0_RWYwrQgBYNRmgp1u3dEm1eKeSCWsVPl23xGuTPnyDrQ_YrdXSYGtU2gaDNz4_wOY7BaWT8x1WXZNLtfvo4jk6saqN5uKvD9Hr_d1i-ljMXx5m05t5ocuSQsFE3WijjWKECyKM0FBXmnBbWmC6shMuGq6buhKqbiqtGBV5REArQYG-s3KIrvq7m-C_tiYmufLbkEVESRmpgTEQB-q6p3TwMQZj5SZkM2EvgchDVjJbkb9ZZXbcszvXmv3_oJw9L_qNH8Fva5c</recordid><startdate>202210</startdate><enddate>202210</enddate><creator>Shan, Chun</creator><creator>Zhou, Siyi</creator><creator>Zhang, Ziyi</creator><creator>Li, Mianjie</creator><general>Hindawi Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-7830-0108</orcidid><orcidid>https://orcid.org/0000-0003-4925-6085</orcidid><orcidid>https://orcid.org/0000-0002-0807-478X</orcidid><orcidid>https://orcid.org/0000-0001-8509-6264</orcidid></search><sort><creationdate>202210</creationdate><title>Digital watermarking method for image feature point extraction and analysis</title><author>Shan, Chun ; Zhou, Siyi ; Zhang, Ziyi ; Li, Mianjie</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3321-796dcecea708909e9c164c08f3f17c4f589d8cd649a6d4ca729f3f01ca9212b73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Digital imaging</topic><topic>Digital watermarking</topic><topic>Digital watermarks</topic><topic>Discrete Wavelet Transform</topic><topic>Embedding</topic><topic>Feature extraction</topic><topic>information hiding</topic><topic>information security</topic><topic>Intelligent systems</topic><topic>Multimedia</topic><topic>Robustness</topic><topic>second‐level wavelet decomposition</topic><topic>wavelet transform</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shan, Chun</creatorcontrib><creatorcontrib>Zhou, Siyi</creatorcontrib><creatorcontrib>Zhang, Ziyi</creatorcontrib><creatorcontrib>Li, Mianjie</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of intelligent systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shan, Chun</au><au>Zhou, Siyi</au><au>Zhang, Ziyi</au><au>Li, Mianjie</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Digital watermarking method for image feature point extraction and analysis</atitle><jtitle>International journal of intelligent systems</jtitle><date>2022-10</date><risdate>2022</risdate><volume>37</volume><issue>10</issue><spage>7281</spage><epage>7299</epage><pages>7281-7299</pages><issn>0884-8173</issn><eissn>1098-111X</eissn><abstract>Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on feature extraction, since the feature points themselves are robust as strong corner points in the images. We will perform specific practical applications in information‐hiding scenarios, such as ticket anticounterfeiting, copyright protection, tampering hints, and covert marking. As a result, while assuring the accuracy of hidden data, assault resistance must also be addressed. In this paper, a strategy for watermark embedding utilizing image feature points is proposed. In principle, the embedding and extraction of digital watermarks are achieved in the transform domain by discrete wavelet transform processing to make digital images more robust than before. The effectiveness of the algorithm is analyzed by experimental data, in which different wavelet bases are used. To check the robustness of the watermarking algorithm, various attacks are performed on watermarked images.</abstract><cop>New York</cop><pub>Hindawi Limited</pub><doi>10.1002/int.22881</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0001-7830-0108</orcidid><orcidid>https://orcid.org/0000-0003-4925-6085</orcidid><orcidid>https://orcid.org/0000-0002-0807-478X</orcidid><orcidid>https://orcid.org/0000-0001-8509-6264</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0884-8173
ispartof International journal of intelligent systems, 2022-10, Vol.37 (10), p.7281-7299
issn 0884-8173
1098-111X
language eng
recordid cdi_proquest_journals_2706177197
source Access via Wiley Online Library
subjects Algorithms
Digital imaging
Digital watermarking
Digital watermarks
Discrete Wavelet Transform
Embedding
Feature extraction
information hiding
information security
Intelligent systems
Multimedia
Robustness
second‐level wavelet decomposition
wavelet transform
Wavelet transforms
title Digital watermarking method for image feature point extraction and analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T18%3A47%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Digital%20watermarking%20method%20for%20image%20feature%20point%20extraction%20and%20analysis&rft.jtitle=International%20journal%20of%20intelligent%20systems&rft.au=Shan,%20Chun&rft.date=2022-10&rft.volume=37&rft.issue=10&rft.spage=7281&rft.epage=7299&rft.pages=7281-7299&rft.issn=0884-8173&rft.eissn=1098-111X&rft_id=info:doi/10.1002/int.22881&rft_dat=%3Cproquest_cross%3E2706177197%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2706177197&rft_id=info:pmid/&rfr_iscdi=true