Watermarking based on local binary pattern operators
Document Type
Syllabus
Publication Date
1-1-2017
Abstract
The successes of the Internet and digital consumer devices have been profoundly changing our society and daily lives by making the capture, transmission, and storage of digital data extremely easy and convenient. However, this raises large concern on how to secure these data and prevent unauthorized modification. This issue has become problematic in many areas, such as copyright protection including (Schyndel et al., 1994; Pitas, 1996; Swanson et al., 1996; Xia et al., 1997), content authentication (Yeo and Kim, 2001; Cvejic and Tujkovic, 2004), hiding of information (Tanaka et al., 1990), and covered communications (Chen and Wornell, 2001). Digital watermarking technologies are considered to be an effective means to address this issue. Many researchers have developed various algorithms of digital watermarking methods which intend to embed some secret data (called watermark) in digital content to mark or seal the digital data content, such as (Cox et al., 1997; Podilchuk and Zeng, 1998; Kaewkamnerd and Rao, 2000; Piva et al., 2000; Reed and Hannigan, 2002; 142 Bas et al., 2003; Shih and Wu, 2003; Shih, 2008; Tsui et al., 2008; Sachnev et al., 2009; Wei and Ngan, 2009; Yang et al., 2009; Luo et al., 2010; Wu and Cheung, 2010). The watermark embedded into a host image is such that the embeddinginduced distortion is too small to be noticed. At the same time, the embedded watermark must be robust enough to withstand common degradations or deliberate attacks.
Identifier
85052593361 (Scopus)
ISBN
[9781439873311, 9781439873328]
Publication Title
Multimedia Security Watermarking Steganography and Forensics
External Full Text Location
https://doi.org/10.1201/b12697
First Page
141
Last Page
163
Recommended Citation
Zhang, Wenyin and Shih, Frank Y., "Watermarking based on local binary pattern operators" (2017). Faculty Publications. 9968.
https://digitalcommons.njit.edu/fac_pubs/9968