• Opto-Electronic Engineering
  • Vol. 37, Issue 8, 67 (2010)
LI Jian-zhong*
Author Affiliations
  • [in Chinese]
  • show less
    DOI: Cite this Article
    LI Jian-zhong. Robust Zero-watermarking Scheme Against Geometric Attacks Using Computer Generated Hologram[J]. Opto-Electronic Engineering, 2010, 37(8): 67 Copy Citation Text show less
    References

    [1] Dong P,Brankov J G,Galatsanos N P,et al. Digital Watermarking Robust to Geometric Distortions [J]. IEEE Trans. on Image Processing(S1057-7149),2005,14(12):2140-2150.

    [2] WEN Quan,SUN Tan-feng,WANG Shu-xun. Concept and application of zero-watermark [J]. Acta Electronica Sinica,2003, 3(1):214-216.

    [3] JIN Wei,LI Jin-xiang,YIN Cao-qian. An image zero-watermarking scheme based on visual cryptography utilizing contour-wavelet [J]. Journal of Optoelectronics·Laser,2009,20(5):653-656.

    [4] LI Xue-bin,YU Deng-feng,CHENG Liang. Zero-watermark Algorithm Based on SVD [J]. Computer Engineering,2009, 35(11):163-165.

    [5] WANG Zhong,SUN Yu. Zero watermarking algorithm based on Zernike moments [J]. Computer Applications,2008,28(9):2233-2235.

    [6] Okman O E,Akar G B. Quantization index modulation-based image watermarking using digital holography [J]. Opt. Soc. Am. A (S1084-7529),2007,24(1):243-253.

    [7] Takai N,Mifune Y. Digital watermarking by a holographic technique [J]. Appl. Opt(S0003-6935),2002,41(5),865-873.

    [8] Kishk S,Javidi B. Watermarking of three-dimensional objects by digital holography [J]. Opt. Lett(S0146-9592),2003,28(3):167-169.

    [9] Chang H,Tsan C. Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain [J]. Appl. Opt(S0003-6935),2005,44(29):6211-6219.

    [10] Liu M,Yang G L,Xie H Y,et al. Computer-generated hologram watermarking resilient to rotation and scaling [J]. Opt. Eng (S0091-3286),2007,46(6):060501.

    [11] Li J Z,Zhang X S,Liu S,et al. Adaptive watermarking scheme using a gray-level computer generated hologram [J]. Appl. Opt (S0003-6935),2009,48(26):4858-4865.

    [12] YU Zu-liang,JIN Guo-fan. Computer-generated holography [M]. Beijing:Tsinghua University Press,1984:48-51.

    [13] Liu R,Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Trans. on Multimedia (S1520-9210),2002,4:121-128.

    [14] Khotanzad A,Hong Y H. Invariant image recognition by Zernike moments [J]. IEEE Trans. on Pattern Analysis and Machine Intelligence (S0162-8828),1990,12:489-497.

    [15] Kim B S,Choi J G,Park C H,et al. Robust digital image watermarking method against geometrical attacks [J]. Real Time Imaging(S1077-2014),2003,9:139-149.

    CLP Journals

    [1] CHEN Guangqiu, GAO Yinhan, DUAN Jin, LIN Jie. Fusion Algorithm of Infrared and Visible Images Based on Local NSST and PCNN[J]. Opto-Electronic Engineering, 2014, 41(10): 12

    LI Jian-zhong. Robust Zero-watermarking Scheme Against Geometric Attacks Using Computer Generated Hologram[J]. Opto-Electronic Engineering, 2010, 37(8): 67
    Download Citation