Watermarking based on local binary pattern operators

Wenyin Zhang, Frank Y. Shih

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Scopus citations


The successes of the Internet and digital consumer devices have been profoundly changing our society and daily lives by making the capture, transmission, and storage of digital data extremely easy and convenient. However, this raises large concern on how to secure these data and prevent unauthorized modification. This issue has become problematic in many areas, such as copyright protection including (Schyndel et al., 1994; Pitas, 1996; Swanson et al., 1996; Xia et al., 1997), content authentication (Yeo and Kim, 2001; Cvejic and Tujkovic, 2004), hiding of information (Tanaka et al., 1990), and covered communications (Chen and Wornell, 2001). Digital watermarking technologies are considered to be an effective means to address this issue. Many researchers have developed various algorithms of digital watermarking methods which intend to embed some secret data (called watermark) in digital content to mark or seal the digital data content, such as (Cox et al., 1997; Podilchuk and Zeng, 1998; Kaewkamnerd and Rao, 2000; Piva et al., 2000; Reed and Hannigan, 2002; 142 Bas et al., 2003; Shih and Wu, 2003; Shih, 2008; Tsui et al., 2008; Sachnev et al., 2009; Wei and Ngan, 2009; Yang et al., 2009; Luo et al., 2010; Wu and Cheung, 2010). The watermark embedded into a host image is such that the embeddinginduced distortion is too small to be noticed. At the same time, the embedded watermark must be robust enough to withstand common degradations or deliberate attacks.

Original languageEnglish (US)
Title of host publicationMultimedia Security
Subtitle of host publicationWatermarking, Steganography, and Forensics
PublisherCRC Press
Number of pages23
ISBN (Electronic)9781439873328
ISBN (Print)9781439873311
StatePublished - Jan 1 2017

All Science Journal Classification (ASJC) codes

  • General Computer Science
  • General Engineering


Dive into the research topics of 'Watermarking based on local binary pattern operators'. Together they form a unique fingerprint.

Cite this