Table of Contents Author Guidelines Submit a Manuscript
Advances in Multimedia
Volume 2012, Article ID 875759, 17 pages
http://dx.doi.org/10.1155/2012/875759
Research Article

Robust Signature-Based Copyright Protection Scheme Using the Most Significant Gray-Scale Bits of the Image

Cooperative Research Centre for Spatial Information, Department of Infrastructure Engineering, University of Melbourne, VIC 3010, Australia

Received 15 November 2011; Revised 2 March 2012; Accepted 27 March 2012

Academic Editor: Xian-Sheng Hua

Copyright © 2012 Mohammad Awrangjeb. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. H. Chen, G. Horng, and W. B. Lee, “A publicly verifiable copyright-proving scheme resistant to malicious attacks,” IEEE Transactions on Industrial Electronics, vol. 52, no. 1, pp. 327–334, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, Englewood Cliffs, NJ, USA, 2nd edition, 1999.
  3. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997. View at Google Scholar · View at Scopus
  4. M. Kutter, F. Jordan, and F. Bossen, “Digital watermarking of color images using amplitude modulation,” Journal of Electronic Imaging, vol. 7, no. 2, pp. 326–332, 1998. View at Google Scholar · View at Scopus
  5. R. K. Sharma and S. Decker, “Practical challenges for digital watermarking applications,” in Proceedings of the IEEE 4th Workshop on Multimedia Signal Processing, pp. 237–242, October 2001. View at Scopus
  6. I. J. Cox, M. L. Miller, and A. L. Mckellips, “Watermarking as communications with side information,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1127–1141, 1999. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Awrangjeb and M. S. Kankanhalli, “Reversible watermarking using a perceptual model,” Journal of Electronic Imaging, vol. 14, no. 1, Article ID 013014, pp. 1–8, 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 573–586, 1998. View at Google Scholar · View at Scopus
  9. K. Ratakonda, R. Dugad, and N. Ahuja, “Digital image watermarking: issues in resolving rightful ownership,” in Proceedings of the International Conference on Image Processing (ICIP '98), vol. 2, pp. 414–418, October 1998. View at Scopus
  10. C. I. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525–539, 1998. View at Google Scholar · View at Scopus
  11. M. Awrangjeb and G. Lu, “A robust content-based watermarking technique,” in Proceedings of the IEEE 10th Workshop on Multimedia Signal Processing (MMSP '08), pp. 713–718, Cairns, Australia, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  12. C. C. Chang, K. F. Hwang, and M. S. Hwang, “Robust authentication scheme for protecting copyrights of images and graphics,” IEE Proceedings: Vision, Image and Signal Processing, vol. 149, no. 1, pp. 43–50, 2002. View at Publisher · View at Google Scholar · View at Scopus
  13. W. B. Lee and T. H. Chen, “A public verifiable copy protection technique for still images,” Journal of Systems and Software, vol. 62, no. 3, pp. 195–204, 2002. View at Publisher · View at Google Scholar · View at Scopus
  14. C. C. Chang, J. Y. Hsiao, and C. L. Chiang, “An image copyright protection scheme based on torus automorphism,” in Proceedings of the 1st International Symposium on Cyber Worlds, pp. 217–224, November 2002.
  15. C. C. Chang and J. C. Chuang, “An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,” Pattern Recognition Letters, vol. 23, no. 8, pp. 931–941, 2002. View at Publisher · View at Google Scholar · View at Scopus
  16. H. Quan and S. Guangchuan, “A semi-blind robust watermarking for digital images,” in Proceedings of the IEEE International Conference on Accoustics, Speech, and Signal Processing, vol. 2, pp. 541–544, April 2003. View at Scopus
  17. C. Y. Lin and S. F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153–168, 2001. View at Publisher · View at Google Scholar · View at Scopus
  18. C. S. Lu and H. Y. M. Liao, “Structural digital signature for image authentication: an incidental distortion resistant scheme,” IEEE Transactions on Multimedia, vol. 5, no. 2, pp. 161–173, 2003. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Katzenbeisser, “On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking,” in Proceedings of the 12th International Workshop on Database and Expert Systems Applications, pp. 815–819, 2001.
  20. B. Macq, J. Dittmann, and E. J. Delp, “Benchmarking of image watermarking algorithms for digital rights management,” Proceedings of the IEEE, vol. 92, no. 6, pp. 971–983, 2004. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Awrangjeb and M. Murshed, “Robust signature-based geometric invariant copyright protection,” in Proceedings of the IEEE International Conference on Image Processing (ICIP '06), pp. 1961–1964, Atlanta, Ga, USA, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  22. Free Foto.com, 2005, http://www.freefoto.com.
  23. “Photo database,” 2005, http://www.petitcolas.net/fabien/watermarking/image_database/.
  24. F. A. P. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 58–64, 2000. View at Publisher · View at Google Scholar · View at Scopus
  25. M. Awrangjeb, G. Lu, and M. Murshed, “Global geometric distortion correction in images,” in Proceedings of the IEEE 8th Workshop on Multimedia Signal Processing (MMSP '06), pp. 435–440, Victoria, Canada, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Awrangjeb and G. Lu, “A robust corner matching technique,” in Proceedings of the IEEE International Conference onMultimedia and Expo (ICME '07), pp. 1483–1486, Beijing, China, July 2007. View at Scopus
  27. N. Cristianini and J. S. Taylor, An Introduction to Support Vector Machines and other Kernel-Based Learning Methods, Cambridge University Press, New York, NY, USA, 1st edition, 2000.
  28. G. A. F. Seber, Multivariate Observations, Wiley, New York, NY, USA, 1984.