<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232013000500015</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Cropping Resilient Watermarking Based on Histogram Modification]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cedillo-Hernandez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Nakano-Miyatake]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Garcia-Ugalde]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Perez-Meana]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidad Nacional Autónoma de México Facultad de Ingeniería ]]></institution>
<addr-line><![CDATA[México D. F.]]></addr-line>
<country>México</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Instituto Politécnico Nacional Escuela Superior de Ingeniería Mecánica y Eléctrica Unidad Culhuacan]]></institution>
<addr-line><![CDATA[México D. F.]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>10</month>
<year>2013</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>10</month>
<year>2013</year>
</pub-date>
<volume>11</volume>
<numero>5</numero>
<fpage>764</fpage>
<lpage>779</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232013000500015&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232013000500015&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232013000500015&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[This paper proposes a watermarking scheme robust against most common geometric and signal processing operations, for applications that require an accurate detection of the owner watermark even if the digital image suffers intentional and non-intentional attacks. The proposed scheme is based on two modifications introduced in two 2D histograms. In the first modification a selected region of a 2D histogram, composed by red and green (R-G) color components, is modified according to the watermark bit sequence; while in the second modification another 2D histogram, composed by blue (B) and filtered red (R) components, is partitioned into several blocks to embed the watermark data bits. The experimental results show fairly good robustness against several geometric distortions, common signal processing operations and some quite aggressive combined attacks. A watermark robustness comparison with the related works and an analysis of the embedding method from the watermark robustness point of view are provided, in order to explain the robustness improvement of the proposed algorithm, especially against rotation and cropping attacks. The ROC curves also provided to show the desirable detection performance of the proposed method. Comparisons with the previously reported methods, based on different techniques, are also provided.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[En este artículo se propone un esquema de marca de agua robusto contra operaciones de tipo geométrico así como de procesamiento avanzado de señales, orientado a aplicaciones que requieren una detección precisa de la marca de agua aun cuando la imagen sufre de ataques intencionales o no intencionales. El esquema propuesto se basa en un par de modificaciones introducidas en dos histogramas bidimensionales. En la primera de ellas, una región seleccionada de un histograma bidimensional, conformado por las componentes de color rojo y verde (R-G), se modifica de acuerdo a la secuencia de marca de agua; mientras que en la segunda modificación, otro histograma bidimensional compuesto por la componente azul (B) y una versión filtrada de la componente de color rojo (R) es particionado en varios bloques para insertar los bits de la marca de agua. Los resultados experimentales muestran una buena robustez ante diversas distorsiones geométricas, operaciones de procesamiento avanzado de señales y algunos ataques combinados algo agresivos. La robustez de la marca de agua obtenida del algoritmo propuesto y de otros trabajos relacionados, así como un análisis del método de inserción desde el punto de vista de robustez, correspondiente al método propuesto en este trabajo, son proporcionados para explicar la mejoría en la robustez del algoritmo propuesto contra ataques de rotación y recorte. Las curvas ROC también se proporcionan para mostrar las características de operación deseables del método propuesto, así como los resultados de comparación del método propuesto con otros esquemas propuestos previamente en la literatura, los cuales emplean técnicas de inserción y detección diferentes a la propuesta en este trabajo.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Copyright protection]]></kwd>
<kwd lng="en"><![CDATA[Digital watermarking]]></kwd>
<kwd lng="en"><![CDATA[Cropping attack]]></kwd>
<kwd lng="en"><![CDATA[Geometric distortions]]></kwd>
<kwd lng="en"><![CDATA[RGB color model]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>Cropping Resilient Watermarking Based on Histogram Modification</b></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>M. Cedillo&#45;Hernandez<sup>1</sup>, M. Nakano&#45;Miyatake<sup>2</sup>, F. Garcia&#45;Ugalde<sup>1</sup>, H. Perez&#45;Meana*<sup>2</sup></b></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><sup><i>1</i></sup> <i>Facultad de Ingenier&iacute;a Universidad Nacional Aut&oacute;noma de M&eacute;xico M&eacute;xico, D. F., M&eacute;xico.</i></font></p>  	    <p align="justify"><font face="verdana" size="2"><i><sup>2</sup> Escuela Superior de Ingenier&iacute;a Mec&aacute;nica y El&eacute;ctrica Unidad Culhuacan Instituto Polit&eacute;cnico Nacional M&eacute;xico, D. F., M&eacute;xico.</i> *<a href="mailto:hmperezm@ipn.mx">hmperezm@ipn.mx</a>.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>ABSTRACT</b></font></p>  	    <p align="justify"><font face="verdana" size="2">This paper proposes a watermarking scheme robust against most common geometric and signal processing operations, for applications that require an accurate detection of the owner watermark even if the digital image suffers intentional and non&#45;intentional attacks. The proposed scheme is based on two modifications introduced in two 2D histograms. In the first modification a selected region of a 2D histogram, composed by red and green (R&#45;G) color components, is modified according to the watermark bit sequence; while in the second modification another 2D histogram, composed by blue (B) and filtered red (R) components, is partitioned into several blocks to embed the watermark data bits. The experimental results show fairly good robustness against several geometric distortions, common signal processing operations and some quite aggressive combined attacks. A watermark robustness comparison with the related works and an analysis of the embedding method from the watermark robustness point of view are provided, in order to explain the robustness improvement of the proposed algorithm, especially against rotation and cropping attacks. The ROC curves also provided to show the desirable detection performance of the proposed method. Comparisons with the previously reported methods, based on different techniques, are also provided.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Copyright protection, Digital watermarking, Cropping attack, Geometric distortions, RGB color model.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>RESUMEN</b></font></p>  	    <p align="justify"><font face="verdana" size="2">En este art&iacute;culo se propone un esquema de marca de agua robusto contra operaciones de tipo geom&eacute;trico as&iacute; como de procesamiento avanzado de se&ntilde;ales, orientado a aplicaciones que requieren una detecci&oacute;n precisa de la marca de agua aun cuando la imagen sufre de ataques intencionales o no intencionales. El esquema propuesto se basa en un par de modificaciones introducidas en dos histogramas bidimensionales. En la primera de ellas, una regi&oacute;n seleccionada de un histograma bidimensional, conformado por las componentes de color rojo y verde (R&#45;G), se modifica de acuerdo a la secuencia de marca de agua; mientras que en la segunda modificaci&oacute;n, otro histograma bidimensional compuesto por la componente azul (B) y una versi&oacute;n filtrada de la componente de color rojo (R) es particionado en varios bloques para insertar los bits de la marca de agua. Los resultados experimentales muestran una buena robustez ante diversas distorsiones geom&eacute;tricas, operaciones de procesamiento avanzado de se&ntilde;ales y algunos ataques combinados algo agresivos. La robustez de la marca de agua obtenida del algoritmo propuesto y de otros trabajos relacionados, as&iacute; como un an&aacute;lisis del m&eacute;todo de inserci&oacute;n desde el punto de vista de robustez, correspondiente al m&eacute;todo propuesto en este trabajo, son proporcionados para explicar la mejor&iacute;a en la robustez del algoritmo propuesto contra ataques de rotaci&oacute;n y recorte. Las curvas ROC tambi&eacute;n se proporcionan para mostrar las caracter&iacute;sticas de operaci&oacute;n deseables del m&eacute;todo propuesto, as&iacute; como los resultados de comparaci&oacute;n del m&eacute;todo propuesto con otros esquemas propuestos previamente en la literatura, los cuales emplean t&eacute;cnicas de inserci&oacute;n y detecci&oacute;n diferentes a la propuesta en este trabajo.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v11n5/v11n5a15.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b><i>References</i></b></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; Barni M., Effectiveness of exhaustive search and template matching against watermark desynchronization, IEEE Trans. on Signal Processing Letter, Vol. 12, No. 2, pp. 158&#45;261, 2005.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840313&pid=S1665-6423201300050001500001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; Solachidis V. &amp; I. Pitas I., Circularly symmetric watermark embedding in 2D DFT domain, IEEE Trans. on Image Processing, Vol. 10, No. 11, pp. 1741&#45;1753, 2001.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840315&pid=S1665-6423201300050001500002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; Ruanaidh J. O. &amp; Pun T., Rotation, scale and translation invariant digital image watermarking, in Proceedings of International Conference on Image Processing, 1997, pp. 536&#45;539.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840317&pid=S1665-6423201300050001500003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; Kang X., Huang J., Shi Y. Q. &amp; Lin Y., A DWT&#45;DFT composite watermarking scheme robust to both affine transform and JPEG compression, IEEE Trans. Circuits Syst. Video Technol., Vol. 13, No. 8, pp. 776&#45;786, 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840319&pid=S1665-6423201300050001500004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; Bas P., Chassery J. M. &amp; Macq B., Geometrically invariant watermarking using feature points, IEEE Trans. on Image Processing, Vol. 11, No. 9, 2002, pp. 1014&#45;1028, 2002.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840321&pid=S1665-6423201300050001500005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; Dong P, Brankov J. B., Galatsanos N. P., Yang Y. &amp; F. Davoine, Digital watermarking to geometric distortions, IEEE Trans. on Image Processing, Vol. 14, No. 12, pp. 2140&#45;2150, 2005.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840323&pid=S1665-6423201300050001500006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; Cedillo M., Nakano M. &amp; Perez&#45;Meana H., A robust watermarking technique based on image normalization, Revista Facultad de Ingenieria Univ. Antioquia, Vol. 52, pp. 147&#45;160, 2010.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840325&pid=S1665-6423201300050001500007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; Coltuc D. &amp; Bolon P., Robust watermarking by histogram specification, in Proceedings of International Conference on Signal Processing, 1999, pp. 236&#45;239.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840327&pid=S1665-6423201300050001500008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; Chareyron G., Macq B. &amp; Tremeau A., Watermarking of color images based on segmentation of the XYZ color space, in Proceedings of CGIV European Conference on Color in Graphics, Imaging and Vision, Aachen, Germany, 2004, pp. 178&#45;182.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840329&pid=S1665-6423201300050001500009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; Roy S., &amp; Chang E. C., Watermarking color histogram, in Proceedings of International Conference on Image Processing, 2004, pp. 2191&#45;2194.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840331&pid=S1665-6423201300050001500010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; Lin C. H., Chan D. Y., Su H. and Hsieh W. S., Histogram oriented watermarking algorithm: color image watermarking scheme robust against geometric attacks and signal processing, IEE Proceeding.&#45;Vis. on Image Signal Processing Vol. 153, No. 4, pp. 483&#45;492, 2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840333&pid=S1665-6423201300050001500011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; Ng N., Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia), availble form <a href="http://enprint.iacr.org/2005/086.pdf" target="_blank">http://enprint.iacr.org/2005/086.pdf</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840335&pid=S1665-6423201300050001500012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; Lee Y. L., Kim H.C. &amp; Park H. W., Blocking effect reduction of JPEG images by signal adaptive filtering, IEEE Transactions on Image Processing, Vol. 7, No. 2, 1998, pp. 229&#45;234, 1998.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840336&pid=S1665-6423201300050001500013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; Sheikh H. R. &amp; Bovik A. C., Image information and visual quality, IEEE Transactions on Image Processing, Vol. 15, No. 2, pp. 430&#45;444, 2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840338&pid=S1665-6423201300050001500014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; Chang H. and Chen H. H., Stochastic Color Interpolation for Digital Cameras, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 17, No. 8, pp. 964&#45;973, 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840340&pid=S1665-6423201300050001500015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; Plataniotis K. N. &amp; Venetsanopoulos A. N., Color Image Processing and Applications, Springer Verlag, Berlin, 2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840342&pid=S1665-6423201300050001500016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;17&#93; A. Sahoo A. &amp; Singh M. P., Fuzzy Weighted Adaptive Linear Filter for Color Image Restoration Using Morphological Detectors, International Journal on Computer Science and Engineering, Vol. 1 No. 3, pp. 217&#45;221, 2009.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840344&pid=S1665-6423201300050001500017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;18&#93; StirMark 4.0 available available from, <a href="http://www.petitcolas.net/fabien/watermarking/stirmark/" target="_blank">http://www.petitcolas.net/fabien/watermarking/stirmark/</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4840346&pid=S1665-6423201300050001500018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barni]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Effectiveness of exhaustive search and template matching against watermark desynchronization]]></article-title>
<source><![CDATA[IEEE Trans. on Signal Processing Letter]]></source>
<year>2005</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>158-261</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Solachidis]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Pitas]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Circularly symmetric watermark embedding in 2D DFT domain]]></article-title>
<source><![CDATA[IEEE Trans. on Image Processing]]></source>
<year>2001</year>
<volume>10</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1741-1753</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ruanaidh]]></surname>
<given-names><![CDATA[J. O.]]></given-names>
</name>
<name>
<surname><![CDATA[Pun]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Rotation, scale and translation invariant digital image watermarking]]></article-title>
<source><![CDATA[Proceedings of International Conference on Image Processing]]></source>
<year>1997</year>
<page-range>536-539</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[Y. Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression]]></article-title>
<source><![CDATA[IEEE Trans. Circuits Syst. Video Technol.]]></source>
<year>2003</year>
<volume>13</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>776-786</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bas]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chassery]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Macq]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Geometrically invariant watermarking using feature points]]></article-title>
<source><![CDATA[IEEE Trans. on Image Processing]]></source>
<year>2002</year>
<month>20</month>
<day>02</day>
<volume>11</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1014-1028</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dong]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Brankov]]></surname>
<given-names><![CDATA[J. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Galatsanos]]></surname>
<given-names><![CDATA[N. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Davoine]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Digital watermarking to geometric distortions]]></article-title>
<source><![CDATA[IEEE Trans. on Image Processing]]></source>
<year>2005</year>
<volume>14</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>2140-2150</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cedillo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Nakano]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Perez-Meana]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A robust watermarking technique based on image normalization]]></article-title>
<source><![CDATA[Revista Facultad de Ingenieria]]></source>
<year>2010</year>
<volume>52</volume>
<page-range>147-160</page-range><publisher-name><![CDATA[Univ. Antioquia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coltuc]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Bolon]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Robust watermarking by histogram specification]]></article-title>
<source><![CDATA[Proceedings of International Conference on Signal Processing]]></source>
<year>1999</year>
<page-range>236-239</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chareyron]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Macq]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Tremeau]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Watermarking of color images based on segmentation of the XYZ color space]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ Proceedings of CGIV European Conference on Color in Graphics, Imaging and Vision]]></conf-name>
<conf-date>2004</conf-date>
<conf-loc>Aachen </conf-loc>
<page-range>178-182</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Roy]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[E. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Watermarking color histogram]]></article-title>
<source><![CDATA[Proceedings of International Conference on Image Processing]]></source>
<year>2004</year>
<page-range>2191-2194</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[C. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[D. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hsieh]]></surname>
<given-names><![CDATA[W. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Histogram oriented watermarking algorithm: color image watermarking scheme robust against geometric attacks and signal processing]]></article-title>
<source><![CDATA[IEE Proceeding.-Vis. on Image Signal Processing]]></source>
<year>2006</year>
<volume>153</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>483-492</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ng]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia)]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Y. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[H.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[H. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Blocking effect reduction of JPEG images by signal adaptive filtering]]></article-title>
<source><![CDATA[IEEE Transactions on Image Processing]]></source>
<year>1998</year>
<month>19</month>
<day>98</day>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>229-234</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sheikh]]></surname>
<given-names><![CDATA[H. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Bovik]]></surname>
<given-names><![CDATA[A. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Image information and visual quality]]></article-title>
<source><![CDATA[IEEE Transactions on Image Processing]]></source>
<year>2006</year>
<volume>15</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>430-444</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[H. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Stochastic Color Interpolation for Digital Cameras]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems for Video Technology]]></source>
<year>2007</year>
<volume>17</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>964-973</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Plataniotis]]></surname>
<given-names><![CDATA[K. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Venetsanopoulos]]></surname>
<given-names><![CDATA[A. N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Color Image Processing and Applications]]></source>
<year>2000</year>
<publisher-loc><![CDATA[Berlin ]]></publisher-loc>
<publisher-name><![CDATA[Springer Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sahoo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[M. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Fuzzy Weighted Adaptive Linear Filter for Color Image Restoration Using Morphological Detectors]]></article-title>
<source><![CDATA[International Journal on Computer Science and Engineering]]></source>
<year>2009</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>217-221</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="">
<source><![CDATA[StirMark 4.0]]></source>
<year></year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
