This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Watermarking Polygonal Lines Using Fourier Descriptors
May/June 2004 (vol. 24 no. 3)
pp. 44-51
Vassilios Solachidis, Aristotle University of Thessaloniki
Ioannis Pitas, Aristotle University of Thessaloniki
This article presents a blind watermarking method for vector graphics images. Unlike the common watermarking methods, where the image luminance is altered, the coordinates of the polygonal curve vertices are modified in the presented method. The watermark is embedded in the Fourier descriptors of the vertices of the polygonal lines, resulting in slight alterations of the polygonal line?s vertex coordinates. Due to the Fourier descriptor properties, the watermark is detectable even after rotation, translation, scaling, additive Gaussian noise, smoothing, reflection attacks, or combination of these attacks.

1. A.K. Jain, Fundamentals of Digital Image Processing, Prentice Hall, 1989.
2. F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Attacks on Copyright Marking Systems," Proc. 2nd Workshop Information Hiding Papers, LNCS 1525, Springer-Verlag, 1998, pp. 218-238.
1. Proc. IEEE, special issue on identification and protection of multimedia information, vol. 87, no. 7, 1999.
2. IEEE J. Selected Areas Comm., special issue on copyright and privacy protection, vol. 16, no. 4, May 1998.
3. I. Cox et al., "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image Processing, Vol. 6, No. 12, Dec. 1997, pp. 1673-1687 (originally published in 1995 as NEC TR 95-10).
4. F. Hartung, J.K. Su, and B. Girod, "Spread Spectrum Watermarking: Malicious Attacks and Counter-Attacks," Proc. SPIE: Security and Watermarking of Multimedia Contents, vol. 3657, SPIE, 1999, pp. 147-158.
5. S. Craver et al., "Resolving Rightful Ownership with Invisible Watermarking Techniques: Limitations, Attacks, and Implications," IEEE J. Selected Areas in Comm., vol. 4, no. 16, May 1998, pp. 573-586.
6. I.J. Cox and J.P. Linnartz, "Some General Methods for Tampering with Watermarks," IEEE J. Selected Areas Comm., vol. 16, no. 4, May 1998, pp. 587-593.

Citation:
Vassilios Solachidis, Ioannis Pitas, "Watermarking Polygonal Lines Using Fourier Descriptors," IEEE Computer Graphics and Applications, vol. 24, no. 3, pp. 44-51, May-June 2004, doi:10.1109/MCG.2004.1297010
Usage of this product signifies your acceptance of the Terms of Use.