Les Inscriptions à la Bibliothèque sont ouvertes en
ligne via le site: https://biblio.enp.edu.dz
Les Réinscriptions se font à :
• La Bibliothèque Annexe pour les étudiants en
2ème Année CPST
• La Bibliothèque Centrale pour les étudiants en Spécialités
A partir de cette page vous pouvez :
Retourner au premier écran avec les recherches... |
Détail de l'auteur
Auteur Jianru Xue
Documents disponibles écrits par cet auteur
Affiner la rechercheAn integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection / Lihua Tian in Signal processing. Image communication, Vol. 26 N° 8-9 (Octobre 2011)
[article]
in Signal processing. Image communication > Vol. 26 N° 8-9 (Octobre 2011) . - pp. 427–437
Titre : An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection Type de document : texte imprimé Auteurs : Lihua Tian, Auteur ; Nanning Zheng, Auteur ; Jianru Xue, Auteur Année de publication : 2012 Article en page(s) : pp. 427–437 Note générale : Electronique Langues : Anglais (eng) Mots-clés : Watermarking Image authentication Visual saliency Tamper detection and localization Résumé : This paper proposes an integrated visual saliency-based watermarking approach, which can be used for both synchronous image authentication and copyright protection. Firstly, regions of interest (ROIs), which are not in a fixed size and can present the most important information of one image, would be extracted automatically using the proto-object based saliency attention model. Secondly, to resist common signal processing attacks, for each ROI, an improved quantization method is employed to embed the copyright information into its DCT coefficients. Finally, the edge map of one ROI is chosen as the fragile watermark, and is then embedded into the DWT domain of the watermarked image to further resist the tampering attacks. Using ROI-based visual saliency as a bridge, this proposed method can achieve image authentication and copyright protection synchronously, and it can also preserve much more robust information. Experimental results on standard benchmark demonstrate that compared with the state-of-the-art watermarking scheme, the proposed method is more robust to white noise, filtering and JPEG compression attacks. Furthermore, it also shows that the proposed method can effectively detect tamper and locate forgery. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596511000671 [article] An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection [texte imprimé] / Lihua Tian, Auteur ; Nanning Zheng, Auteur ; Jianru Xue, Auteur . - 2012 . - pp. 427–437.
Electronique
Langues : Anglais (eng)
in Signal processing. Image communication > Vol. 26 N° 8-9 (Octobre 2011) . - pp. 427–437
Mots-clés : Watermarking Image authentication Visual saliency Tamper detection and localization Résumé : This paper proposes an integrated visual saliency-based watermarking approach, which can be used for both synchronous image authentication and copyright protection. Firstly, regions of interest (ROIs), which are not in a fixed size and can present the most important information of one image, would be extracted automatically using the proto-object based saliency attention model. Secondly, to resist common signal processing attacks, for each ROI, an improved quantization method is employed to embed the copyright information into its DCT coefficients. Finally, the edge map of one ROI is chosen as the fragile watermark, and is then embedded into the DWT domain of the watermarked image to further resist the tampering attacks. Using ROI-based visual saliency as a bridge, this proposed method can achieve image authentication and copyright protection synchronously, and it can also preserve much more robust information. Experimental results on standard benchmark demonstrate that compared with the state-of-the-art watermarking scheme, the proposed method is more robust to white noise, filtering and JPEG compression attacks. Furthermore, it also shows that the proposed method can effectively detect tamper and locate forgery. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596511000671