{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T14:27:11Z","timestamp":1778336831620,"version":"3.51.4"},"reference-count":21,"publisher":"World Scientific Pub Co Pte Lt","issue":"03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2009,7]]},"abstract":"<jats:p> Watermarking is now considered as an efficient means for assuring copyright protection and data owner identification. Watermark embedding techniques depend on the representation domain of the image (spatial, frequency, and multiresolution). Every domain has its specific advantages and limitations. Moreover, each technique in a chosen domain is found to be robust to specific sets of attack types. So we need to propose more robust domains to defeat these limitations and respect all the watermarking criterions (capacity, invisibility and robustness). In this paper, a new watermarking method is presented using a new domain for the image representation and the watermark embedding: the mathematical Hessenberg transformation. This domain is found to be robust against a wide range of STIRMARK attacks such as JPEG compression, convolution filtering and noise adding. The robustness of the new technique in preserving and extracting the embedded watermark is proved after various attacks types. It is also improved when compared with other methods in use. In addition, the proposed method is blind and the use of the host image is not needed in the watermark detection process. <\/jats:p>","DOI":"10.1142\/s0219467809003514","type":"journal-article","created":{"date-parts":[[2009,8,5]],"date-time":"2009-08-05T09:24:26Z","timestamp":1249464266000},"page":"411-433","source":"Crossref","is-referenced-by-count":8,"title":["IMAGE WATERMARKING BASED ON THE HESSENBERG TRANSFORM"],"prefix":"10.1142","volume":"09","author":[{"given":"HASSEN","family":"SEDDIK","sequence":"first","affiliation":[{"name":"High School of Sciences and Techniques of Tunis, 5 Av. Taha Hussein, 1008, Tunis, Tunisia"}]},{"given":"MOUNIR","family":"SAYADI","sequence":"additional","affiliation":[{"name":"High School of Sciences and Techniques of Tunis, 5 Av. Taha Hussein, 1008, Tunis, Tunisia"}]},{"given":"FARHAT","family":"FNAIECH","sequence":"additional","affiliation":[{"name":"High School of Sciences and Techniques of Tunis, 5 Av. Taha Hussein, 1008, Tunis, Tunisia"}]},{"given":"MOHAMED","family":"CHERIET","sequence":"additional","affiliation":[{"name":"\u00c9cole de Technologie Sup\u00e9rieure, Notre-Dame, Montreal, Quebec H3C 1K3, Canada"}]}],"member":"219","published-online":{"date-parts":[[2011,11,20]]},"reference":[{"key":"rf2","volume":"13","author":"Miller M. L.","journal-title":"IEEE Trans. on Image Processing"},{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00017-6"},{"key":"rf4","volume":"13","author":"Fei C.","journal-title":"IEEE Trans. on Image Processing"},{"key":"rf6","first-page":"673","volume":"6","author":"Cox I.","journal-title":"IEEE Trans. on Image Processing"},{"key":"rf7","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.802512"},{"key":"rf11","volume":"36","author":"Shih F. Y.","journal-title":"Pattern Recognition"},{"key":"rf12","volume":"84","author":"Tsai P.","journal-title":"Signal Processing"},{"key":"rf13","unstructured":"G. H.\u00a0Golub and C. F.\u00a0Van Loan, Matrix Computation, ed.  (1983)\u00a0p. 384."},{"key":"rf14","first-page":"81","volume":"6","author":"Seddik H.","journal-title":"International Journal on Graphics, Vision and Image Processing"},{"key":"rf17","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00059-0"},{"key":"rf19","volume":"23","author":"Natarajan A.","journal-title":"IEEE Trans. on Computers"},{"key":"rf21","volume-title":"Data Compression","author":"Sayood K.","year":"2000"},{"key":"rf22","doi-asserted-by":"publisher","DOI":"10.1109\/79.879337"},{"key":"rf23","volume-title":"Tatouage de documents audiovisuels num\u00e9riques","author":"Davoine F.","year":"2004"},{"key":"rf24","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2003.09.016"},{"key":"rf25","first-page":"107","author":"Lan P.","journal-title":"Journal of Systems and Software"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(03)00067-2"},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1109\/78.950793"},{"key":"rf28","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719604"},{"key":"rf29","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-01-01387-4"},{"key":"rf31","first-page":"415","volume":"46","author":"Huang J.","journal-title":"IEEE Trans. on Consumer Electron"}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467809003514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T23:14:39Z","timestamp":1565133279000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219467809003514"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":21,"journal-issue":{"issue":"03","published-online":{"date-parts":[[2011,11,20]]},"published-print":{"date-parts":[[2009,7]]}},"alternative-id":["10.1142\/S0219467809003514"],"URL":"https:\/\/doi.org\/10.1142\/s0219467809003514","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"value":"0219-4678","type":"print"},{"value":"1793-6756","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7]]}}}