Skip to main content

Introduction

  • Chapter
  • First Online:
Triangle Mesh Watermarking and Steganography
  • 214 Accesses

Abstract

In this chapter, we introduce the basic concept of information hiding, steganography, and watermarking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ding, W., Ming, Y., Cao, Z. & Lin, C. A generalized deep neural network approach for digital watermarking analysis. IEEE Transactions On Emerging Topics In Computational Intelligence. (2021)

    Google Scholar 

  2. Zear, A. & Singh, P. Secure and robust color image dual watermarking based on LWT-DCT-SVD. Multimedia Tools And Applications. pp. 1–18 (2021)

    Google Scholar 

  3. Singh, R. & Ashok, A. An optimized robust watermarking technique using CKGSA in frequency domain. Journal Of Information Security And Applications. 58 pp. 102734 (2021)

    Article  Google Scholar 

  4. Seo, J. & Yoo, C. Image watermarking based on invariant regions of scale-space representation. IEEE Transactions On Signal Processing. 54, 1537–1549 (2006)

    Article  MATH  Google Scholar 

  5. Lydia, E., Raj, J., Pandi Selvam, R., Elhoseny, M. & Shankar, K. Application of discrete transforms with selective coefficients for blind image watermarking. Transactions On Emerging Telecommunications Technologies. 32, e3771 (2021)

    Article  Google Scholar 

  6. Fares, K., Khaldi, A., Redouane, K. & Salah, E. DCT & DWT based watermarking scheme for medical information security. Biomedical Signal Processing And Control. 66 pp. 102403 (2021)

    Article  Google Scholar 

  7. Sinhal, R., Jain, D. & Ansari, I. Machine learning based blind color image watermarking scheme for copyright protection. Pattern Recognition Letters. 145 pp. 171–177 (2021)

    Article  Google Scholar 

  8. Li, Y., Wei, D. & Zhang, L. Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain. Information Sciences. 551 pp. 205–227 (2021)

    Article  MATH  Google Scholar 

  9. Hosny, K., Darwish, M. & Fouda, M. Robust color images watermarking using new fractional-order exponent moments. IEEE Access. 9 pp. 47425–47435 (2021)

    Article  Google Scholar 

  10. Voloshynovskiy, S., Deguillaume, F. & Pun, T. Content adaptive watermarking based on a stochastic multiresolution image modeling. 2000 10th European Signal Processing Conference. pp. 1–4 (2000)

    Google Scholar 

  11. Kundur, D. & Hatzinakos, D. A robust digital image watermarking method using wavelet-based fusion. Proceedings Of International Conference On Image Processing. 1 pp. 544–547 (1997)

    Article  Google Scholar 

  12. Maheshwari, J., Kumar, M., Mathur, G., Yadav, R. & Kakerda, R. Robust digital image watermarking using DCT based pyramid transform via image compression. 2015 International Conference On Communications And Signal Processing (ICCSP). pp. 1059–1063 (2015)

    Google Scholar 

  13. Coltuc, D. & Bolon, P. Robust watermarking by histogram specification. Proceedings 1999 International Conference On Image Processing (Cat. 99CH36348). 2 pp. 236–239 (1999)

    Google Scholar 

  14. Xiang, S., Kim, H. & Huang, J. Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Transactions On Circuits And Systems For Video Technology. 18, 777–790 (2008)

    Article  Google Scholar 

  15. Lutovac, B., Daković, M., Stanković, S. & Orović, I. An algorithm for robust image watermarking based on the DCT and Zernike moments. Multimedia Tools And Applications. 76, 23333–23352 (2017)

    Article  Google Scholar 

  16. Horng, S., Rosiyadi, D., Li, T., Takao, T., Guo, M. & Khan, M. A blind image copyright protection scheme for e-government. Journal Of Visual Communication And Image Representation. 24, 1099–1105 (2013)

    Article  Google Scholar 

  17. Parah, S., Sheikh, J., Loan, N. & Bhat, G. Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Processing. 53 pp. 11–24 (2016)

    Article  Google Scholar 

  18. Urvoy, M., Goudia, D. & Autrusseau, F. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Transactions On Information Forensics And Security. 9, 1108–1119 (2014)

    Article  Google Scholar 

  19. Solachidis, V. & Pitas, L. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Transactions On Image Processing. 10, 1741–1753 (2001)

    Article  MATH  Google Scholar 

  20. Cedillo-Hernandez, M., Garcia-Ugalde, F., Nakano-Miyatake, M. & Perez-Meana, H. Robust watermarking method in DFT domain for effective management of medical imaging. Signal, Image And Video Processing. 9, 1163–1178 (2015)

    Article  Google Scholar 

  21. Thakkar, F. & Srivastava, V. A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools And Applications. 76, 3669–3697 (2017)

    Article  Google Scholar 

  22. Hu, H. & Hsu, L. Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics. Multimedia Tools And Applications. 76, 6575–6594 (2017)

    Article  Google Scholar 

  23. Amiri, T. & Moghaddam, M. A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images. Multimedia Tools And Applications. 75, 8527–8543 (2016)

    Article  Google Scholar 

  24. Barni, M., Bartolini, F., Cappellini, V. & Piva, A. A DCT-domain system for robust image watermarking. Signal Processing. 66, 357–372 (1998)

    Article  MATH  Google Scholar 

  25. Sisaudia, V. & Vishwakarma, V. Copyright protection using KELM-PSO based multi-spectral image watermarking in DCT domain with local texture information based selection. Multimedia Tools And Applications. 80, 8667–8688 (2021)

    Article  Google Scholar 

  26. Kahlessenane, F., Khaldi, A., Kafi, R. & Euschi, S. A DWT based watermarking approach for medical image protection. Journal Of Ambient Intelligence And Humanized Computing. 12, 2931–2938 (2021)

    Article  Google Scholar 

  27. Kang, X., Huang, J., Shi, Y. & Lin, Y. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions On Circuits And Systems For Video Technology. 13, 776–786 (2003)

    Article  Google Scholar 

  28. Al-Haj, A. Combined DWT-DCT digital image watermarking. Journal Of Computer Science. 3, 740–746 (2007)

    Article  Google Scholar 

  29. Nakamura, T., Katayama, A., Yamamuro, M. & Sonehara, N. Fast watermark detection scheme for camera-equipped cellular phone. Proceedings Of The 3rd International Conference On Mobile And Ubiquitous Multimedia. pp. 101–108 (2004)

    Google Scholar 

  30. Katayama, A., Nakamura, T., Yamamuro, M. & Sonehara, N. New high-speed frame detection method: Side Trace Algorithm (STA) for i-appli on cellular phones to detect watermarks. Proceedings Of The 3rd International Conference On Mobile And Ubiquitous Multimedia. pp. 109–116 (2004)

    Google Scholar 

  31. Pramila, A., Keskinarkaus, A. & Seppänen, T. Reading watermarks from printed binary images with a camera phone. International Workshop On Digital Watermarking. pp. 227–240 (2009)

    Google Scholar 

  32. Pramila, A., Keskinarkaus, A. & Seppänen, T. Toward an interactive poster using digital watermarking and a mobile phone camera. Signal, Image And Video Processing. 6, 211–222 (2012)

    Article  Google Scholar 

  33. Pramila, A., Keskinarkaus, A., Takala, V. & Seppänen, T. Extracting watermarks from printouts captured with wide angles using computational photography. Multimedia Tools And Applications. 76, 16063–16084 (2017)

    Article  Google Scholar 

  34. Pramila, A., Keskinarkaus, A. & Seppänen, T. Increasing the capturing angle in print-cam robust watermarking. Journal Of Systems And Software. 135 pp. 205–215 (2018)

    Google Scholar 

  35. Kang, X., Huang, J. & Zeng, W. Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. IEEE Transactions On Information Forensics And Security. 5, 1–12 (2010)

    Article  Google Scholar 

  36. Delgado-Guillen, L., Garcia-Hernandez, J. & Torres-Huitzil, C. Digital watermarking of color images utilizing mobile platforms. 2013 IEEE 56th International Midwest Symposium On Circuits And Systems (MWSCAS). pp. 1363–1366 (2013)

    Google Scholar 

  37. Schaber, P., Kopf, S., Wetzel, S., Ballast, T., Wesch, C. & Effelsberg, W. CamMark: Analyzing, modeling, and simulating artifacts in camcorder copies. ACM Transactions On Multimedia Computing, Communications, And Applications (TOMM). 11, 1–23 (2015)

    Article  Google Scholar 

  38. Gugelmann, D., Sommer, D., Lenders, V., Happe, M. & Vanbever, L. Screen watermarking for data theft investigation and attribution. 2018 10th International Conference On Cyber Conflict (CyCon). pp. 391–408 (2018)

    Google Scholar 

  39. He, K., Zhang, X., Ren, S. & Sun, J. Deep residual learning for image recognition. Proceedings Of The IEEE Conference On Computer Vision And Pattern Recognition. pp. 770–778 (2016)

    Google Scholar 

  40. Zhu, J., Kaplan, R., Johnson, J. & Fei-Fei, L. Hidden: Hiding data with deep networks. Proceedings Of The European Conference On Computer Vision (ECCV). pp. 657–672 (2018)

    Google Scholar 

  41. Tancik, M., Mildenhall, B. & Ng, R. Stegastamp: Invisible hyperlinks in physical photographs. Proceedings Of The IEEE/CVF Conference On Computer Vision And Pattern Recognition. pp. 2117–2126 (2020)

    Google Scholar 

  42. Wengrowski, E., Dana, K., Gruteser, M. & Mandayam, N. Reading between the pixels: Photographic steganography for camera display messaging. 2017 IEEE International Conference On Computational Photography (ICCP). pp. 1–11 (2017)

    Google Scholar 

  43. Liu, Y., Guo, M., Zhang, J., Zhu, Y. & Xie, X. A novel two-stage separable deep learning framework for practical blind watermarking. Proceedings Of The 27th ACM International Conference On Multimedia. pp. 1509–1517 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Cite this chapter

Zhou, H., Chen, K., Ma, Z., Wang, F., Zhang, W. (2023). Introduction. In: Triangle Mesh Watermarking and Steganography. Springer, Singapore. https://doi.org/10.1007/978-981-19-7720-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-7720-6_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-7719-0

  • Online ISBN: 978-981-19-7720-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics