You are not logged in.

A modified moment-based image watermarking method robust to cropping attack

Zong, Tianrui, Xiang, Yong, Elbadry, Suzan and Nahavandi, Saeid 2013, A modified moment-based image watermarking method robust to cropping attack, in ICIEA 2013 : Proceedings of the 8th IEEE Conference on Industrial Electronics and Applications, IEEE, Piscataway, N.J., pp. 881-885, doi: 10.1109/ICIEA.2013.6566491.

Attached Files
Name Description MIMEType Size Downloads

Title A modified moment-based image watermarking method robust to cropping attack
Author(s) Zong, Tianrui
Xiang, YongORCID iD for Xiang, Yong orcid.org/0000-0003-3545-7863
Elbadry, Suzan
Nahavandi, Saeid
Conference name IEEE Industrial Electronics and Applications. Conference (8th : 2013 : Melbourne, Victoria)
Conference location Melbourne, Victoria
Conference dates 19-21 Jun. 2013
Title of proceedings ICIEA 2013 : Proceedings of the 8th IEEE Conference on Industrial Electronics and Applications
Editor(s) [Unknown]
Publication date 2013
Conference series IEEE Conference on Industrial Electronics and Applications
Start page 881
End page 885
Total pages 5
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) image watermarking
cropping
moment invariants
probability density function
Summary Developing a watermarking method that is robust to cropping attack is a challenging task in image watermarking. The moment-based watermarking schemes show good robustness to common signal processing attacks and some geometric attacks but are sensitive to cropping attack. In this paper, we modify the moment-based approach to deal with cropping attack. Firstly, we find the probability density function (pdf) of the pixel value distribution from the original image. Secondly, we reshape and normalize the pdf of the pixel value distribution (PPVD) to form a two dimensional image. Then, the moment invariants are calculated from the PPVD image. Since PPVD is insensitive to cropping, the proposed method is robust to cropping attack. Besides, it also has high robustness against other common attacks. Experimental results demonstrate the effectiveness of the proposed method.
ISBN 1467363227
9781467363228
Language eng
DOI 10.1109/ICIEA.2013.6566491
Field of Research 090609 Signal Processing
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2013, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30057162

Document type: Conference Paper
Collections: School of Information Technology
Centre for Intelligent Systems Research
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 280 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Wed, 23 Oct 2013, 10:02:19 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.