{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,22]],"date-time":"2024-12-22T14:10:07Z","timestamp":1734876607950,"version":"3.32.0"},"reference-count":19,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2005,1]]},"abstract":"<jats:p>In this paper, we propose an improved autocorrelation function (ACF)-based watermarking that is robust against combined geometric and removal attacks. ACF-based watermarking is known to be effective against geometric attacks. In this watermarking scheme, both the embedded watermark and autocorrelation peaks of the watermark should survive a variety of attacks. However, the autocorrelation peaks are not strong enough. The proposed method improves the robustness of ACF-based watermarking by enhancing the strength of the autocorrelation peaks. Instead of the simple addition of a watermark to an image, the proposed watermark embedder uses the information of an original image more actively during the embedding process, so that the marked image has strong autocorrelation peaks. Experimental results show that the proposed scheme provides better robustness than conventional ACF-based watermarking against a variety of combined geometric-removal attacks.<\/jats:p>","DOI":"10.1142\/s0219467805001653","type":"journal-article","created":{"date-parts":[[2005,1,11]],"date-time":"2005-01-11T00:55:02Z","timestamp":1105404902000},"page":"37-65","source":"Crossref","is-referenced-by-count":2,"title":["IMAGE WATERMARKING RESISTANT TO COMBINED GEOMETRIC AND REMOVAL ATTACKS"],"prefix":"10.1142","volume":"05","author":[{"given":"CHOONG-HOON","family":"LEE","sequence":"first","affiliation":[{"name":"Department of Computer Science and Advanced Information Technology Research Center (AITrc), Korea Advanced Institute of Science and Technology (KAIST), Guseong-Dong, Yuseong-Gu, Daejon, 305-701, Korea"}]},{"given":"HEUNG-KYU","family":"LEE","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Advanced Information Technology Research Center (AITrc), Korea Advanced Institute of Science and Technology (KAIST), Guseong-Dong, Yuseong-Gu, Daejon, 305-701, Korea"}]},{"given":"YOUNGHO","family":"SUH","sequence":"additional","affiliation":[{"name":"Digital Content Research Division, Electronics and Telecommunications Research Institute (ETRI), Gajeong-Dong, Yuseong-Gu, Daejon, 305-350, Korea"}]}],"member":"219","published-online":{"date-parts":[[2011,11,20]]},"reference":[{"key":"rf1","doi-asserted-by":"publisher","DOI":"10.1145\/278476.278485"},{"key":"rf2","doi-asserted-by":"publisher","DOI":"10.1109\/79.879337"},{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.779316"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00012-7"},{"key":"rf6","unstructured":"S.\u00a0Pereira and T.\u00a0Pun, In International Workshop on Information Hiding, Vol. LNCS 1768 of Lecture Notes in Computer Science (1999)\u00a0pp. 200\u2013210."},{"volume-title":"In Tenth European Signal Processing Conference (EUSIPCO'2000)","year":"2000","author":"Voloshynovskiy S.","key":"rf7"},{"key":"rf8","volume-title":"In SPIE International Symposium on Voice, Video, and Data Communications","volume":"3528","author":"Kutter M.","year":"1998"},{"key":"rf9","doi-asserted-by":"publisher","DOI":"10.1117\/12.435424"},{"key":"rf10","doi-asserted-by":"publisher","DOI":"10.1109\/83.918569"},{"key":"rf11","unstructured":"S.\u00a0Voloshynovskiy, F.\u00a0Deguillaume and T.\u00a0Pun, 2001 IEEE Int. Conf. of Image Processing (ICIP 2001)\u00a03 (Thessaloniki, Greece, 2001)\u00a0pp. 999\u20131002."},{"key":"rf12","doi-asserted-by":"publisher","DOI":"10.1109\/5.771068"},{"key":"rf13","doi-asserted-by":"crossref","unstructured":"M.\u00a0Kutter, S. K.\u00a0Bhattacharjee and T.\u00a0Ebrahimi, IEEE Int. Conf. of Image Processing 1999\u00a01 (Kobe, Japan, 1999)\u00a0pp. 320\u2013323.","DOI":"10.1109\/ICIP.1999.821622"},{"key":"rf14","doi-asserted-by":"publisher","DOI":"10.1117\/12.385013"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00011-5"},{"key":"rf16","doi-asserted-by":"publisher","DOI":"10.1117\/12.435423"},{"key":"rf17","unstructured":"S.\u00a0Voloshynovskiy, In International Workshop on Information Hiding, Vol. LNCS 1768 of Lecture Notes in Computer Science (Springer Verlag, Dresden, Germany, 1999)\u00a0pp. 212\u2013236."},{"volume-title":"Two-Dimensional Signal and Image Processing","year":"1990","author":"Lim J. S.","key":"rf18"},{"volume-title":"Digital Watermarking","year":"2002","author":"Cox I. J.","key":"rf19"}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467805001653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,22]],"date-time":"2024-12-22T13:55:35Z","timestamp":1734875735000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219467805001653"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,1]]},"references-count":19,"journal-issue":{"issue":"01","published-online":{"date-parts":[[2011,11,20]]},"published-print":{"date-parts":[[2005,1]]}},"alternative-id":["10.1142\/S0219467805001653"],"URL":"https:\/\/doi.org\/10.1142\/s0219467805001653","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"type":"print","value":"0219-4678"},{"type":"electronic","value":"1793-6756"}],"subject":[],"published":{"date-parts":[[2005,1]]}}}