{"title":"基于特征的图像版权保护新方法","authors":"Hung-Min Sun, Chen-Jung Hong, Chiung-Hsun Chen","doi":"10.1109/ITRE.2005.1503111","DOIUrl":null,"url":null,"abstract":"Watermarking scheme is a well-known method for copyright protection of images. However, it encounters two serious problems. First, some successful attacks can be easily developed to destroy watermark once the embedding algorithm of watermarking is made public. Secondly, we can not identify who the real owner is if multiple watermarks are embedded in an image. In this paper, a robust copyright protection scheme for digital images that combines image feature extraction and time stamp technique is proposed. Our scheme can resist both geometric distortion and signal processing attacks, and can distinguish who the real owner is when multiple watermarks are embedded in the image. Some simulation results are conducted to show that our scheme can work well and efficiently.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A new approach to feature-based copyright protection of images\",\"authors\":\"Hung-Min Sun, Chen-Jung Hong, Chiung-Hsun Chen\",\"doi\":\"10.1109/ITRE.2005.1503111\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Watermarking scheme is a well-known method for copyright protection of images. However, it encounters two serious problems. First, some successful attacks can be easily developed to destroy watermark once the embedding algorithm of watermarking is made public. Secondly, we can not identify who the real owner is if multiple watermarks are embedded in an image. In this paper, a robust copyright protection scheme for digital images that combines image feature extraction and time stamp technique is proposed. Our scheme can resist both geometric distortion and signal processing attacks, and can distinguish who the real owner is when multiple watermarks are embedded in the image. Some simulation results are conducted to show that our scheme can work well and efficiently.\",\"PeriodicalId\":338920,\"journal\":{\"name\":\"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.\",\"volume\":\"76 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITRE.2005.1503111\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITRE.2005.1503111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new approach to feature-based copyright protection of images
Watermarking scheme is a well-known method for copyright protection of images. However, it encounters two serious problems. First, some successful attacks can be easily developed to destroy watermark once the embedding algorithm of watermarking is made public. Secondly, we can not identify who the real owner is if multiple watermarks are embedded in an image. In this paper, a robust copyright protection scheme for digital images that combines image feature extraction and time stamp technique is proposed. Our scheme can resist both geometric distortion and signal processing attacks, and can distinguish who the real owner is when multiple watermarks are embedded in the image. Some simulation results are conducted to show that our scheme can work well and efficiently.