Digital watermarking method for image feature point extraction and analysis
Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on fea...
Gespeichert in:
Veröffentlicht in: | International journal of intelligent systems 2022-10, Vol.37 (10), p.7281-7299 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 7299 |
---|---|
container_issue | 10 |
container_start_page | 7281 |
container_title | International journal of intelligent systems |
container_volume | 37 |
creator | Shan, Chun Zhou, Siyi Zhang, Ziyi Li, Mianjie |
description | Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on feature extraction, since the feature points themselves are robust as strong corner points in the images. We will perform specific practical applications in information‐hiding scenarios, such as ticket anticounterfeiting, copyright protection, tampering hints, and covert marking. As a result, while assuring the accuracy of hidden data, assault resistance must also be addressed. In this paper, a strategy for watermark embedding utilizing image feature points is proposed. In principle, the embedding and extraction of digital watermarks are achieved in the transform domain by discrete wavelet transform processing to make digital images more robust than before. The effectiveness of the algorithm is analyzed by experimental data, in which different wavelet bases are used. To check the robustness of the watermarking algorithm, various attacks are performed on watermarked images. |
doi_str_mv | 10.1002/int.22881 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2706177197</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2706177197</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3321-796dcecea708909e9c164c08f3f17c4f589d8cd649a6d4ca729f3f01ca9212b73</originalsourceid><addsrcrecordid>eNp1kE9PAyEQxYnRxFo9-A1IPHnYlmG3CxxN_dfY6KUm3giyUKnbpQJN7beXul49TOYwv5l57yF0CWQEhNCx69KIUs7hCA2ACF4AwNsxGhDOq4IDK0_RWYwrQgBYNRmgp1u3dEm1eKeSCWsVPl23xGuTPnyDrQ_YrdXSYGtU2gaDNz4_wOY7BaWT8x1WXZNLtfvo4jk6saqN5uKvD9Hr_d1i-ljMXx5m05t5ocuSQsFE3WijjWKECyKM0FBXmnBbWmC6shMuGq6buhKqbiqtGBV5REArQYG-s3KIrvq7m-C_tiYmufLbkEVESRmpgTEQB-q6p3TwMQZj5SZkM2EvgchDVjJbkb9ZZXbcszvXmv3_oJw9L_qNH8Fva5c</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2706177197</pqid></control><display><type>article</type><title>Digital watermarking method for image feature point extraction and analysis</title><source>Access via Wiley Online Library</source><creator>Shan, Chun ; Zhou, Siyi ; Zhang, Ziyi ; Li, Mianjie</creator><creatorcontrib>Shan, Chun ; Zhou, Siyi ; Zhang, Ziyi ; Li, Mianjie</creatorcontrib><description>Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on feature extraction, since the feature points themselves are robust as strong corner points in the images. We will perform specific practical applications in information‐hiding scenarios, such as ticket anticounterfeiting, copyright protection, tampering hints, and covert marking. As a result, while assuring the accuracy of hidden data, assault resistance must also be addressed. In this paper, a strategy for watermark embedding utilizing image feature points is proposed. In principle, the embedding and extraction of digital watermarks are achieved in the transform domain by discrete wavelet transform processing to make digital images more robust than before. The effectiveness of the algorithm is analyzed by experimental data, in which different wavelet bases are used. To check the robustness of the watermarking algorithm, various attacks are performed on watermarked images.</description><identifier>ISSN: 0884-8173</identifier><identifier>EISSN: 1098-111X</identifier><identifier>DOI: 10.1002/int.22881</identifier><language>eng</language><publisher>New York: Hindawi Limited</publisher><subject>Algorithms ; Digital imaging ; Digital watermarking ; Digital watermarks ; Discrete Wavelet Transform ; Embedding ; Feature extraction ; information hiding ; information security ; Intelligent systems ; Multimedia ; Robustness ; second‐level wavelet decomposition ; wavelet transform ; Wavelet transforms</subject><ispartof>International journal of intelligent systems, 2022-10, Vol.37 (10), p.7281-7299</ispartof><rights>2022 Wiley Periodicals LLC</rights><rights>2022 Wiley Periodicals LLC.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3321-796dcecea708909e9c164c08f3f17c4f589d8cd649a6d4ca729f3f01ca9212b73</citedby><cites>FETCH-LOGICAL-c3321-796dcecea708909e9c164c08f3f17c4f589d8cd649a6d4ca729f3f01ca9212b73</cites><orcidid>0000-0001-7830-0108 ; 0000-0003-4925-6085 ; 0000-0002-0807-478X ; 0000-0001-8509-6264</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fint.22881$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fint.22881$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27924,27925,45574,45575</link.rule.ids></links><search><creatorcontrib>Shan, Chun</creatorcontrib><creatorcontrib>Zhou, Siyi</creatorcontrib><creatorcontrib>Zhang, Ziyi</creatorcontrib><creatorcontrib>Li, Mianjie</creatorcontrib><title>Digital watermarking method for image feature point extraction and analysis</title><title>International journal of intelligent systems</title><description>Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on feature extraction, since the feature points themselves are robust as strong corner points in the images. We will perform specific practical applications in information‐hiding scenarios, such as ticket anticounterfeiting, copyright protection, tampering hints, and covert marking. As a result, while assuring the accuracy of hidden data, assault resistance must also be addressed. In this paper, a strategy for watermark embedding utilizing image feature points is proposed. In principle, the embedding and extraction of digital watermarks are achieved in the transform domain by discrete wavelet transform processing to make digital images more robust than before. The effectiveness of the algorithm is analyzed by experimental data, in which different wavelet bases are used. To check the robustness of the watermarking algorithm, various attacks are performed on watermarked images.</description><subject>Algorithms</subject><subject>Digital imaging</subject><subject>Digital watermarking</subject><subject>Digital watermarks</subject><subject>Discrete Wavelet Transform</subject><subject>Embedding</subject><subject>Feature extraction</subject><subject>information hiding</subject><subject>information security</subject><subject>Intelligent systems</subject><subject>Multimedia</subject><subject>Robustness</subject><subject>second‐level wavelet decomposition</subject><subject>wavelet transform</subject><subject>Wavelet transforms</subject><issn>0884-8173</issn><issn>1098-111X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp1kE9PAyEQxYnRxFo9-A1IPHnYlmG3CxxN_dfY6KUm3giyUKnbpQJN7beXul49TOYwv5l57yF0CWQEhNCx69KIUs7hCA2ACF4AwNsxGhDOq4IDK0_RWYwrQgBYNRmgp1u3dEm1eKeSCWsVPl23xGuTPnyDrQ_YrdXSYGtU2gaDNz4_wOY7BaWT8x1WXZNLtfvo4jk6saqN5uKvD9Hr_d1i-ljMXx5m05t5ocuSQsFE3WijjWKECyKM0FBXmnBbWmC6shMuGq6buhKqbiqtGBV5REArQYG-s3KIrvq7m-C_tiYmufLbkEVESRmpgTEQB-q6p3TwMQZj5SZkM2EvgchDVjJbkb9ZZXbcszvXmv3_oJw9L_qNH8Fva5c</recordid><startdate>202210</startdate><enddate>202210</enddate><creator>Shan, Chun</creator><creator>Zhou, Siyi</creator><creator>Zhang, Ziyi</creator><creator>Li, Mianjie</creator><general>Hindawi Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-7830-0108</orcidid><orcidid>https://orcid.org/0000-0003-4925-6085</orcidid><orcidid>https://orcid.org/0000-0002-0807-478X</orcidid><orcidid>https://orcid.org/0000-0001-8509-6264</orcidid></search><sort><creationdate>202210</creationdate><title>Digital watermarking method for image feature point extraction and analysis</title><author>Shan, Chun ; Zhou, Siyi ; Zhang, Ziyi ; Li, Mianjie</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3321-796dcecea708909e9c164c08f3f17c4f589d8cd649a6d4ca729f3f01ca9212b73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Digital imaging</topic><topic>Digital watermarking</topic><topic>Digital watermarks</topic><topic>Discrete Wavelet Transform</topic><topic>Embedding</topic><topic>Feature extraction</topic><topic>information hiding</topic><topic>information security</topic><topic>Intelligent systems</topic><topic>Multimedia</topic><topic>Robustness</topic><topic>second‐level wavelet decomposition</topic><topic>wavelet transform</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shan, Chun</creatorcontrib><creatorcontrib>Zhou, Siyi</creatorcontrib><creatorcontrib>Zhang, Ziyi</creatorcontrib><creatorcontrib>Li, Mianjie</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of intelligent systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shan, Chun</au><au>Zhou, Siyi</au><au>Zhang, Ziyi</au><au>Li, Mianjie</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Digital watermarking method for image feature point extraction and analysis</atitle><jtitle>International journal of intelligent systems</jtitle><date>2022-10</date><risdate>2022</risdate><volume>37</volume><issue>10</issue><spage>7281</spage><epage>7299</epage><pages>7281-7299</pages><issn>0884-8173</issn><eissn>1098-111X</eissn><abstract>Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on feature extraction, since the feature points themselves are robust as strong corner points in the images. We will perform specific practical applications in information‐hiding scenarios, such as ticket anticounterfeiting, copyright protection, tampering hints, and covert marking. As a result, while assuring the accuracy of hidden data, assault resistance must also be addressed. In this paper, a strategy for watermark embedding utilizing image feature points is proposed. In principle, the embedding and extraction of digital watermarks are achieved in the transform domain by discrete wavelet transform processing to make digital images more robust than before. The effectiveness of the algorithm is analyzed by experimental data, in which different wavelet bases are used. To check the robustness of the watermarking algorithm, various attacks are performed on watermarked images.</abstract><cop>New York</cop><pub>Hindawi Limited</pub><doi>10.1002/int.22881</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0001-7830-0108</orcidid><orcidid>https://orcid.org/0000-0003-4925-6085</orcidid><orcidid>https://orcid.org/0000-0002-0807-478X</orcidid><orcidid>https://orcid.org/0000-0001-8509-6264</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0884-8173 |
ispartof | International journal of intelligent systems, 2022-10, Vol.37 (10), p.7281-7299 |
issn | 0884-8173 1098-111X |
language | eng |
recordid | cdi_proquest_journals_2706177197 |
source | Access via Wiley Online Library |
subjects | Algorithms Digital imaging Digital watermarking Digital watermarks Discrete Wavelet Transform Embedding Feature extraction information hiding information security Intelligent systems Multimedia Robustness second‐level wavelet decomposition wavelet transform Wavelet transforms |
title | Digital watermarking method for image feature point extraction and analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T18%3A47%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Digital%20watermarking%20method%20for%20image%20feature%20point%20extraction%20and%20analysis&rft.jtitle=International%20journal%20of%20intelligent%20systems&rft.au=Shan,%20Chun&rft.date=2022-10&rft.volume=37&rft.issue=10&rft.spage=7281&rft.epage=7299&rft.pages=7281-7299&rft.issn=0884-8173&rft.eissn=1098-111X&rft_id=info:doi/10.1002/int.22881&rft_dat=%3Cproquest_cross%3E2706177197%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2706177197&rft_id=info:pmid/&rfr_iscdi=true |