Skip to main content

Tabu Search Based Multi-Watermarking over Lossy Networks

  • Chapter
Intelligent Multimedia Data Hiding

Part of the book series: Studies in Computational Intelligence ((SCI,volume 58))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Decker, S. (2001): Engineering considerations in commercial watermarking. IEEE Communications Magazine, 39, 128-133

    Article  Google Scholar 

  2. Koenen, R.H., Lacy, J., Mackay, M., and Mitchell, S. (2004): The long march to interoperable digital rights management. Proceedings of the IEEE, 92, 883-897

    Article  Google Scholar 

  3. Pan, J.S., Huang, H.C., and Jain, L.C. (editors) (2004): Intelligent watermarking techniques. World Scientific Publishing Company, Singapore

    MATH  Google Scholar 

  4. Sion, R., Atallah, M., and Prabhakar, S. (2004): Rights protection for relational data. IEEE Trans. Knowledge and Data Engineering, 16, 1509-1525

    Article  Google Scholar 

  5. Katzenbeisser, S. and Petitcolas, F. (2000): Information Hiding — Techniques for Steganography and Digital Watermarking. Artech House, Norwood, MA

    Google Scholar 

  6. Chu, W.C. (2003): DCT-based image watermarking using subsampling. IEEE Trans. Multimedia, 5, 34-38

    Article  Google Scholar 

  7. Kang, X., Huang, J., Shi, Y.Q., and Lin, Y. (2003): A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits and Systems for Video Technology, 13, 776-786

    Article  Google Scholar 

  8. Ramkumar, M., Akansu, A.N. (2004): On the design of data hiding methods robust to lossy compression. IEEE Trans. Multimedia, 6, 947-951

    Article  Google Scholar 

  9. Podilchuk, C.I. and Zeng, W.J. (1998): Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Commun., 16, 525-539

    Article  Google Scholar 

  10. Lu, Z.M. and Sun, S.H. (2000): Digital image watermarking technique based on vector quantisation. IEE Electronics Letters, 36, 303-305

    Article  Google Scholar 

  11. . Pan, J.S., Wang, F.H., Huang, H.C., and Jain, L.C. (2003): Improved schemes for VQ-based image watermarking. IEEE Int’l Symposium on Consumer Electronics 2003, paper no: ISCE03011

    Google Scholar 

  12. Glover, F. and Laguna, M. (1997) Tabu Search. Kluwer Academic Publishers, Boston, MA

    MATH  Google Scholar 

  13. Li, C., Liao, X., and Yu, J. (2004) Tabu search for fuzzy optimization and applications. Information Sciences, 158, 3-13

    Article  MATH  MathSciNet  Google Scholar 

  14. Shieh, C.S., Huang, H.C., Wang, F.H., and Pan, J.S. (2004): Genetic watermarking based on transform domain techniques. Pattern Recognition, 37, 555-565

    Article  Google Scholar 

  15. Shih, F.Y. and Wu, Y.T. (2005): Robust watermarking and compression for medical images based on genetic algorithms. Information Sciences, 175, 200-216

    Article  Google Scholar 

  16. Linde, Y., Buzo, A., and Gray, R.M. (1980): An algorithm for vector quantizer design. IEEE Trans. Commun., 28, 84-95

    Article  Google Scholar 

  17. . Pan, J.S., Sung, M.T., Huang, H.C., and Liao, B.Y. (2004): Robust VQ-based digital watermarking for the memoryless binary symmetric channel. IEICE Trans. on Fundamentals, E-87A, 1839-1841

    Google Scholar 

  18. Pan, J.S., Hsin, Y.C., Huang, H.C., and Huang, K.C. (2004): Robust image watermarking based on multiple description vector quantisation. IEE Electronics Letters, 40, 1409-1410

    Article  Google Scholar 

  19. Piva, A., Bartolini, F., and Barni, M. (2002): Managing copyright in open networks. IEEE Internet Computing, 6, 18-26

    Article  Google Scholar 

  20. Waller, A.O., Jones, G., Whitley, T., Edwards, J., Kaleshi, D., Munro, A., MacFarlane, B., and Wood, A. (2002): Securing the delivery of digital content over the Internet. Electronics & Communication Engineering Journal, 14, 239-248

    Article  Google Scholar 

  21. . Petitcolas, F.A.P. (2004): Stirmark benchmark 4.0. Available from: http://www. petitcolas.net/fabien/watermarking/stirmark/

  22. Lee, C.C. and Leu, Y. (2005): Efficient data broadcast schemes for mobile computing environments with data missing. Information Sciences, 172, 335-359

    Article  Google Scholar 

  23. Goyal, V.K. (2001): Multiple description coding: Compression meets the network. IEEE Signal Processing Magazine, 18, 74-93

    Article  Google Scholar 

  24. El Gamal, A.A. and Cover, T.M. (1982): Achievable rates for multiple descriptions. IEEE Trans. Inform. Theory, 28, 851-857

    Article  MATH  MathSciNet  Google Scholar 

  25. Zhang, Z. and Berger, T. (1987): New results in binary multiple descriptions. IEEE Trans. Inform. Theory, 33, 502-521

    Article  MATH  MathSciNet  Google Scholar 

  26. Loo, P. and Kingsbury, N. (2003): Watermark detection based on the properties of error control codes. IEE Proceedings - Vision, Image and Signal Processing, 150,115-121

    Article  Google Scholar 

  27. Vaishampayan, V.A. (1993): Design of multiple description scalar quantizers. IEEE Trans. Inform. Theory, 39, 821-834

    Article  MATH  Google Scholar 

  28. Görtz, N. and Leelapornchai, P. (2003): Optimization of the index assignments for multiple description vector quantizers. IEEE Trans. Commun., 51, 336-340

    Article  Google Scholar 

  29. Wang, Y., Orchard, M.T., Vaishampayan, V.A., and Reibman, A.R. (2001): Multiple description coding using pairwise correlating transforms. IEEE Trans. Image Processing, 10, 351-366

    Article  MATH  Google Scholar 

  30. Wang, Y., Reibman, A.R., Orchard, M.T., and Jafarkhani, H. (2002): An improvement to multiple description transform coding. IEEE Trans. Signal Processing, 50, 2843-2854

    Article  Google Scholar 

  31. . Jo, M. and Kim, H.D. (2002): A digital image watermarking scheme based on vector quantisation, IEICE Trans. Information and Systems, E85-D, 1054-1056

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Huang, HC., Pan, JS., Huang, CY., Huang, YH., Huang, KC. (2007). Tabu Search Based Multi-Watermarking over Lossy Networks. In: Pan, JS., Huang, HC., Jain, L.C., Fang, WC. (eds) Intelligent Multimedia Data Hiding. Studies in Computational Intelligence, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71169-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71169-8_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71168-1

  • Online ISBN: 978-3-540-71169-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics