DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ntalianis, Klimis | - |
dc.contributor.author | Raftopoulos, Konstantinos A. | - |
dc.contributor.author | Kollias, Stefanos | - |
dc.contributor.author | Tzouveli, Paraskevi | - |
dc.date.accessioned | 2024-10-16T10:32:00Z | - |
dc.date.available | 2024-10-16T10:32:00Z | - |
dc.date.issued | 2010-10-29 | - |
dc.identifier | scopus-78650868307 | - |
dc.identifier.isbn | 978-1-4503-0157-2 | - |
dc.identifier.other | 78650868307 | - |
dc.identifier.uri | https://uniwacris.uniwa.gr/handle/3000/2832 | - |
dc.description.abstract | Plain rotation, scaling, and/or translation of an image can lead to loss of watermark synchronization and thus authentication failure. The block based approaches in particular are sensitive to geometric distortions due to the need for repositioning the block's rectangular grid. In this paper, we propose a novel block based approach for watermarking image objects in a way that is invariant to RST distortions. With the term "image object" we refer to semantically contiguous parts of images that have a specific contour boundary. The proposed approach is based on shape information since the watermark is embedded in image blocks, the location and orientation of which is defined by Eulerian tours that are appropriately arranged in layers, around the object's skeleton. The skeleton of the object (MAT transform) is defined by the shape of its boundary and not only is invariant to RST transformations but is also robust to cropping, clipping and other common deformation attacks. Results on the Caltech database are reported, showing the advantages of the proposed scheme. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | MiFor'10: Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence | en_US |
dc.subject | Eulerian tour | en_US |
dc.subject | MAT | en_US |
dc.subject | Object based watermarking | en_US |
dc.subject | Skeleton | en_US |
dc.title | Semantic object watermark re-synchronization based on skeleton vertex corresponds | en_US |
dc.type | Conference Paper | en_US |
dc.relation.conference | 2nd ACM workshop on multimedia in forensics, security and intelligence (MiFor 2010), 29 October 2010, Firenze, Italy | en_US |
dc.identifier.doi | 10.1145/1877972.1877979 | en_US |
dc.identifier.scopus | 2-s2.0-78650868307 | - |
dcterms.accessRights | 0 | en_US |
dc.relation.dept | Department of Business Administration | en_US |
dc.relation.faculty | School of Administrative, Economics and Social Sciences | en_US |
dc.identifier.spage | 13 | en_US |
dc.identifier.epage | 18 | en_US |
dc.collaboration | University of West Attica (UNIWA) | en_US |
dc.journals | Open Access | en_US |
dc.publication | Peer Reviewed | en_US |
dc.country | Greece | en_US |
local.metadatastatus | not verified | en_US |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.openairetype | Conference Paper | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
crisitem.author.dept | Department of Business Administration | - |
crisitem.author.faculty | School of Administrative, Economics and Social Sciences | - |
crisitem.author.parentorg | School of Administrative, Economics and Social Sciences | - |
Appears in Collections: | Book Chapter / Κεφάλαιο Βιβλίου |
CORE Recommender
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.