Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 454867, 14 pages
http://dx.doi.org/10.1155/2014/454867
Research Article

Combining Digital Watermarking and Fingerprinting Techniques to Identify Copyrights for Color Images

1Department of Computer Science and Engineering, Tatung University, Taipei 10452, Taiwan
2Taipei College of Maritime Technology, New Taipei 25172, Taiwan

Received 15 March 2014; Accepted 20 May 2014; Published 8 July 2014

Academic Editor: Fei Yu

Copyright © 2014 Shang-Lin Hsieh et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. Coatrieux, H. Huang, H. Shu, and L. Luo, “A watermarking-based medical image integrity control system and an image moment signature for tampering characterization,” IEEE Journal of Biomedical and Health Informatics, vol. 17, no. 6, pp. 1057–1067, 2013. View at Google Scholar
  2. K.-C. Liu, “Colour image watermarking for tamper proofing and pattern-based recovery,” IET Image Processing, vol. 6, no. 5, pp. 445–454, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. Y.-L. Chen and C.-T. Hsu, “Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 396–406, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. P. -C. Su, Y. -C. Chang, and C. -Y. Wu, “Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1897–1908, 2013. View at Google Scholar
  5. A. Piper and R. Safavi-Naini, “Scalable fragile watermarking for image authentication,” IET Information Security, vol. 7, no. 4, pp. 300–311, 2013. View at Google Scholar
  6. M. Pawlak and Y. Xin, “Robust image watermarking: an invariant domain approach,” in Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, vol. 2, pp. 885–888, May 2002. View at Scopus
  7. W.-H. Lin, S.-J. Horng, T.-W. Kao, P. Fan, C.-L. Lee, and Y. Pan, “An efficient watermarking method based on significant difference of wavelet coefficient quantization,” IEEE Transactions on Multimedia, vol. 10, no. 5, pp. 746–757, 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. I.-K. Kong and C.-M. Pun, “Digital image watermarking with blind detection for copyright verification,” in Proceedings of the 1st International Congress on Image and Signal Processing (CISP '08), vol. 1, pp. 504–508, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. L. A. Elrefaey, M. E. Allam, H. A. Kader, and M. Selim, “Robust blind image-adaptive watermarking,” in Proceedings of the 25th National Radio Science Conference (NRSC '08), March 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. M.-H. Lee and O.-J. Kwon, “Color image watermarking based on DS-CDMA using Hadamard kernel,” in Proceedings of the 10th International Conference on Advanced Communication Technology, pp. 1592–1597, February 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. N.-Y. Lee and C.-C. Wang, “Yet another wavelet watermarking scheme for copyright protection,” in Proceedings of the 9th IEEE International Conference on E-Commerce Technology, pp. 421–424, July 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. H.-M. Sun, C.-J. Hong, and C.-H. Chen, “A new approach to feature-based copyright protection of images,” in Proceedings of the 3rd International Conference on Information Technology: Research and Education (ITRE '05), pp. 233–237, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. C.-C. Chang and J.-C. Chuang, “An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,” Pattern Recognition Letters, vol. 23, no. 8, pp. 931–941, 2002. View at Publisher · View at Google Scholar · View at Scopus
  14. C.-S. Lu, C.-Y. Hsut, S.-W. Sun, and P.-C. Chang, “Robust mesh-based hashing for copy detection and tracing of images,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '04), vol. 1, pp. 731–734, June 2004. View at Scopus
  15. J.-S. Lee and K.-S. Yoon, “The system integration of DRM and fingerprinting,” in Proceedings of the 8th International Conference Advanced Communication Technology (ICACT '06), vol. 3, pp. 2180–2183, February 2006. View at Scopus
  16. S.-H. Yang and C.-F. Chen, “Robust image hashing based on SPIHT,” in Proceedings of the 3rd International Conference on Information Technology: Research and Education (ITRE '05), pp. 110–114, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  17. F. Ahmed and M. Y. Siyal, “A secure and robust DCT-based hashing scheme for image authentication,” in Proceedings of the 10th IEEE Singapore International Conference on Communication Systems (ICCS '06), pp. 1–6, October 2006. View at Scopus
  18. J. S. Seo, J. Haitsma, T. Kalker, and C. D. Yoo, “A robust image fingerprinting system using the Radon transform,” Signal Processing: Image Communication, vol. 19, no. 4, pp. 325–339, 2004. View at Publisher · View at Google Scholar · View at Scopus
  19. P. C. Vila, Content-based audio search: from fingerprinting to semantic audio retrieval [Ph.D. thesis], University Pompeu Fabra, Barcelona, Spain, 2007.
  20. S.-L. Hsieh, I.-J. Tsai, B.-Y. Huang, and J.-J. Jian, “Protecting copyrights of color images using a watermarking scheme based on secret sharing and wavelet transform,” Journal of Multimedia, vol. 3, no. 4, pp. 42–49, 2008. View at Google Scholar · View at Scopus
  21. V. Nabiyev and A. Günay, “Towards a biometric purpose image filter according to skin detection,” in Proceedings of the Second International Conference on Problems of Cybernetics and Informatics, 2008.
  22. C. Poynton, “Frequently asked questions about color,” 2014, http://www.poynton.com/ColorFAQ.html.
  23. G. Voyatzis and I. Pitas, “Applications of torus automorphisms in image watermarking,” in Proceedings of International Conference on Image Processing, vol. 3, pp. 237–240, 1996.
  24. G. Voyatzis and I. Pitas, “Chaotic mixing of digital images and applications to watermarking,” in Proceeding of European Conference on Multimedia Applications, Services and Techniques (ECMAST '96), vol. 2, May 1996.
  25. R. C. Gonzalez and R. E. Woods, Digital Image Processing, Prentice Hall, New York, NY, USA, 2nd edition, 2002.
  26. E. J. Stollnitz, T. D. DeRose, and D. H. Salestin, “Wavelets for computer graphics: a primer, part 1,” IEEE Computer Graphics and Applications, vol. 15, no. 3, pp. 76–84, 1995. View at Publisher · View at Google Scholar · View at Scopus
  27. KeyLawk, “Colors: the human eye is most sensitive to GREEN,” 2014, http://keylawk.blogspot.com/2007/10/colors-human-eye-is-most-sensitive-to.html.
  28. S. Zhao, “Wavelength of maximum human visual sensitivity,” 2014, http://hypertextbook.com/facts/2007/SusanZhao.shtml.
  29. I. Nasir, W. Ying, and J. Jianmin, “Novel multiple spatial watermarking technique in color images,” in International Conference on Information Technology: New Generations (ITNG '08), pp. 777–782, April 2008. View at Publisher · View at Google Scholar · View at Scopus