Watermarking based on local binary pattern operators

Wenyin Zhang, Frank Y. Shih

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

The successes of the Internet and digital consumer devices have been profoundly changing our society and daily lives by making the capture, transmission, and storage of digital data extremely easy and convenient. However, this raises large concern on how to secure these data and prevent unauthorized modification. This issue has become problematic in many areas, such as copyright protection including (Schyndel et al., 1994; Pitas, 1996; Swanson et al., 1996; Xia et al., 1997), content authentication (Yeo and Kim, 2001; Cvejic and Tujkovic, 2004), hiding of information (Tanaka et al., 1990), and covered communications (Chen and Wornell, 2001). Digital watermarking technologies are considered to be an effective means to address this issue. Many researchers have developed various algorithms of digital watermarking methods which intend to embed some secret data (called watermark) in digital content to mark or seal the digital data content, such as (Cox et al., 1997; Podilchuk and Zeng, 1998; Kaewkamnerd and Rao, 2000; Piva et al., 2000; Reed and Hannigan, 2002; 142 Bas et al., 2003; Shih and Wu, 2003; Shih, 2008; Tsui et al., 2008; Sachnev et al., 2009; Wei and Ngan, 2009; Yang et al., 2009; Luo et al., 2010; Wu and Cheung, 2010). The watermark embedded into a host image is such that the embeddinginduced distortion is too small to be noticed. At the same time, the embedded watermark must be robust enough to withstand common degradations or deliberate attacks.

Original languageEnglish (US)
Title of host publicationMultimedia Security
Subtitle of host publicationWatermarking, Steganography, and Forensics
PublisherCRC Press
Pages141-163
Number of pages23
ISBN (Electronic)9781439873328
ISBN (Print)9781439873311
DOIs
StatePublished - Jan 1 2017

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Engineering(all)

Fingerprint Dive into the research topics of 'Watermarking based on local binary pattern operators'. Together they form a unique fingerprint.

Cite this