Abstract
During the image archive transformation, artificial operations often lead to the irregular light distribution, which distorting the content. In this article, we propose a new light-balance technique for refining the under-exposure images, including the text and the text-photo ones. In addition, we have introduced the ownership concept to the transformation procedure so that a restorer can demonstrate who has done this work in the future. Specifically, embedding ownership information into the carrier and refining the light simultaneously can efficiently preserve the image quality. Experimental results have shown that the new method can effectively compensate the brightness to improve the quality of digital images. Furthermore, the embedded logo is able to firmly resist the JPEG compression operation; thus, the outcome is suitable for the Internet delivery.
Similar content being viewed by others
References
Chen KN, Chen CH, Chang CC (2012) Efficient illumination compensation techniques for text images. Digital Signal Process 22:726–733
Cheng CJ, Hwang WJ, Zeng HY, Lin YC (2014) A fragile watermarking algorithm for hologram authentication. J Disp Technol 10(4):263–271
M. El’arbi and C.B. Amar (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626
Hsia SC, Tsai PS (2005) Efficient light balancing techniques for text images in video presentation systems. IEEE Trans Circuits Syst Video Technol 15(8):1026–1031
Hsia SC, Chen MH, Chen YM (2006) A cost-effective line-based light-balancing technique using adaptive processing. IEEE Trans Image Process 15(9):2719–2729
Lee JS, Li B (2014) Self-recognized image protection technique that resists large-scale cropping. IEEE Multimed 21(1):60–73
Lee JS, Chen CH, Chang CC (2009) A novel illumination-balance technique for improving the quality of degraded text-photo images. IEEE Trans Circuits Syst Video Technol 19:900–905
Lee JS, Wong HS, Chen YR, Wang YH (2015) Stable watermarking technique based on XNOR operation and scale relationship. Multimed Tools Appl 74(17):6797–6826
Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9:62–66
Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327
Zong T, Xiang Y, Natgunanathan I, Guo S, Zhou W, Beliakov G (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25(5):717–729
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, JS., Su, HC. & Wei, KJ. Refining irregular image illumination with concurrent ownership embedding. Multimed Tools Appl 77, 19851–19868 (2018). https://doi.org/10.1007/s11042-017-5414-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5414-2