DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ntalianis, Klimis | - |
dc.contributor.author | Raftopoulos, Konstantinos A. | - |
dc.contributor.author | Goudelis, Georgios | - |
dc.contributor.author | Papadakis, Nikos | - |
dc.contributor.author | Kollias, Stefanos | - |
dc.contributor.author | Tzouveli, Paraskevi | - |
dc.date.accessioned | 2024-10-30T12:48:47Z | - |
dc.date.available | 2024-10-30T12:48:47Z | - |
dc.date.issued | 2017-01-01 | - |
dc.identifier | scopus-85015395427 | - |
dc.identifier.isbn | 978-3-319-84667-5 | - |
dc.identifier.isbn | 978-3-319-51500-7 | - |
dc.identifier.uri | https://uniwacris.uniwa.gr/handle/3000/2851 | - |
dc.description.abstract | Plain rotation, scaling, and/or translation (RST) of an image can lead to loss of watermark synchronization and thus authentication failure with standard techniques. The block-based approaches in particular, albeit strong against frequency and cropping attacks, are sensitive to geometric distortions due to the need for repositioning the blocks’ rectangular grid of reference. In this paper, we propose a block-based approach for watermarking image objects in a way that is invariant to RST distortions. With the term image object we refer to semantically contiguous parts of images that have a specific contour boundary. The proposed approach is based on shape information since the watermark is embedded in image blocks, the location and orientation of which are defined by Eulerian tours that are appropriately arranged in layers, around the object’s robust skeleton. The object’s robust skeleton is derived by its boundary after applying an extraction technique and not only is invariant to RST transformations but also to cropping, clipping, and other common deformation attacks, difficult to defend with current methods. Experiments using standard benchmark datasets demonstrate the advantages of the proposed scheme in comparison to alternative state-of-the-art methods. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology | en_US |
dc.relation.ispartofseries | Springer Optimization and Its Applications | en_US |
dc.subject | Image watermarking | en_US |
dc.subject | Intellectual property protection | en_US |
dc.subject | Invariant watermarking | en_US |
dc.subject | Region-based watermarking | en_US |
dc.title | Region-based watermarking for images | en_US |
dc.type | Book Chapter | en_US |
dc.identifier.doi | 10.1007/978-3-319-51500-7_15 | en_US |
dc.identifier.scopus | 2-s2.0-85015395427 | - |
dcterms.accessRights | 0 | en_US |
dc.relation.dept | Department of Business Administration | en_US |
dc.relation.faculty | School of Administrative, Economics and Social Sciences | en_US |
dc.identifier.spage | 331 | en_US |
dc.identifier.epage | 343 | en_US |
dc.collaboration | University of West Attica (UNIWA) | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.journals | Subscription | en_US |
dc.publication | Peer Reviewed | en_US |
dc.country | Greece | en_US |
local.metadatastatus | not verified | en_US |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.openairetype | Book Chapter | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
crisitem.author.dept | Department of Business Administration | - |
crisitem.author.faculty | School of Administrative, Economics and Social Sciences | - |
crisitem.author.parentorg | School of Administrative, Economics and Social Sciences | - |
Appears in Collections: | Book Chapter / Κεφάλαιο Βιβλίου |
CORE Recommender
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.