{"title":"视觉鲁棒无关水印技术","authors":"C. Kung, H.H. Hsiao, W. Cheng, Y. Yan","doi":"10.1109/CCST.2003.1297597","DOIUrl":null,"url":null,"abstract":"With the rapid growth of the Internet, multimedia, and e-commerce, it becomes more convenient and fast for the users to interchange the information. However, it also caused serious problems, for example, the duplication of unauthorized data. Therefore, various techniques are developed to protect the intellectual property and personal information. Watermarking is one of commonly used techniques to hide information in images to discourage unauthorized copying. And watermarking is an owner-designed logo or trademark, which can be hidden in the owner's image products. When the watermarked images are distributed via the public channels, the unauthorized copying may be discouraged. This is because the owner can prove his ownership by extracting the watermark using open algorithms and some security keys. In the scheme, two parts, contour and texture, are separated with the character of human's vision. Position them into different frequency to protect the important character of vision.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"241 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Visual robust oblivious watermarking technique\",\"authors\":\"C. Kung, H.H. Hsiao, W. Cheng, Y. Yan\",\"doi\":\"10.1109/CCST.2003.1297597\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid growth of the Internet, multimedia, and e-commerce, it becomes more convenient and fast for the users to interchange the information. However, it also caused serious problems, for example, the duplication of unauthorized data. Therefore, various techniques are developed to protect the intellectual property and personal information. Watermarking is one of commonly used techniques to hide information in images to discourage unauthorized copying. And watermarking is an owner-designed logo or trademark, which can be hidden in the owner's image products. When the watermarked images are distributed via the public channels, the unauthorized copying may be discouraged. This is because the owner can prove his ownership by extracting the watermark using open algorithms and some security keys. In the scheme, two parts, contour and texture, are separated with the character of human's vision. Position them into different frequency to protect the important character of vision.\",\"PeriodicalId\":344868,\"journal\":{\"name\":\"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.\",\"volume\":\"241 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2003.1297597\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2003.1297597","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the rapid growth of the Internet, multimedia, and e-commerce, it becomes more convenient and fast for the users to interchange the information. However, it also caused serious problems, for example, the duplication of unauthorized data. Therefore, various techniques are developed to protect the intellectual property and personal information. Watermarking is one of commonly used techniques to hide information in images to discourage unauthorized copying. And watermarking is an owner-designed logo or trademark, which can be hidden in the owner's image products. When the watermarked images are distributed via the public channels, the unauthorized copying may be discouraged. This is because the owner can prove his ownership by extracting the watermark using open algorithms and some security keys. In the scheme, two parts, contour and texture, are separated with the character of human's vision. Position them into different frequency to protect the important character of vision.