{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T21:11:41Z","timestamp":1651871501751},"reference-count":17,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,1]]},"abstract":"<p>In this article, a blind image watermarking scheme, which is a robust against common image processing and geometric attacks is proposed by adopting the concept of histogram-based embedding. The average filter is employed to low-pass pre-filter the host image. The watermark bits are embedded into the histogram of the low-frequency component and the template bits are embedded in the high-frequency residual. The embedding is performed by adjusting the value of two consecutive histogram bins. Furthermore, a post-quantization is employed after the embedding round to improve robustness. All pixel modifications incurred are based on the human visual system (HVS) characteristics. As a result, a good tradeoff between robustness and imperceptibility is achieved. Experimental results reported the satisfactory performance of the proposed scheme with respect to both common image processing and geometric attacks.<\/p>","DOI":"10.4018\/ijdcf.2018010105","type":"journal-article","created":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T16:28:50Z","timestamp":1510244930000},"page":"54-66","source":"Crossref","is-referenced-by-count":0,"title":["Geometrically Invariant Image Watermarking Using Histogram Adjustment"],"prefix":"10.4018","volume":"10","author":[{"given":"Zhuoqian","family":"Liang","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"given":"Bingwen","family":"Feng","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"given":"Xuba","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"given":"Xiaotian","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Jinan University, Guangzhou, China, and State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Tao","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Lab of Information Network Security, Ministry of Public Security, Shanghai, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2018010105-0","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2146250"},{"key":"IJDCF.2018010105-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.10.007"},{"key":"IJDCF.2018010105-2","doi-asserted-by":"publisher","DOI":"10.1109\/76.867936"},{"key":"IJDCF.2018010105-3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2039604"},{"key":"IJDCF.2018010105-4","doi-asserted-by":"publisher","DOI":"10.1109\/83.136601"},{"key":"IJDCF.2018010105-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.02.062"},{"key":"IJDCF.2018010105-6","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.876300"},{"key":"IJDCF.2018010105-7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"IJDCF.2018010105-8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_25"},{"key":"IJDCF.2018010105-9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809368"},{"key":"IJDCF.2018010105-10","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00012-7"},{"key":"IJDCF.2018010105-11","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2245415"},{"key":"IJDCF.2018010105-12","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(01)00039-1"},{"key":"IJDCF.2018010105-13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"IJDCF.2018010105-14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.918843"},{"key":"IJDCF.2018010105-15","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2118216"},{"key":"IJDCF.2018010105-16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2014.2363743"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=193020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T20:51:49Z","timestamp":1651870309000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2018010105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,1,1]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2018010105","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,1]]}}}