Vector map watermarking evaluation based on certainty factor

被引:0
|
作者
Sun, Jianguo [1 ]
Xia, Songzhu [1 ]
Zhang, Guoyin [1 ]
机构
[1] Department of computer science and technology, Harbin engineering university, Harbin, China
关键词
Watermarking;
D O I
暂无
中图分类号
学科分类号
摘要
Watermarking appraisement plays an important role in the checking the validity in a watermark system. So far, it is regrettable that there is no any comprehensive appraisement proposed for watermarking technology. In general, test software and methods can only analyze a few factors influencing the watermarking algorithm, which are lacking sufficient credibility. So, a comprehensive watermarking appraisement model based on the theory of certainty factor is proposed in this paper, which firstly discusses the relations of factors and operations contained, which all be assigned weight value. Through reasoning and analysis, every watermark algorithm can be quantified, thus, merits and drawbacks of watermark algorithms are obvious, and it is also easy to achieve the optimal watermark algorithm. © 2005 - 2012 JATIT & LLS. All rights reserved.
引用
收藏
页码:67 / 72
相关论文
共 50 条
  • [41] Contents based watermarking technique
    Kang, HK
    Jung, YJ
    Ro, YM
    MULTIMEDIA SYSTEMS AND APPLICATIONS III, 2001, 4209 : 305 - 312
  • [42] Blind watermarking scheme for polylines in vector geo-spatial data
    Zhiyong Peng
    Mingliang Yue
    Xia Wu
    Yuwei Peng
    Multimedia Tools and Applications, 2015, 74 : 11721 - 11739
  • [43] Adaptive equalization based on watermarking
    Uliani Neto, Mario
    Gomes, Leandro de C. T.
    Romano, Joao Marcos T.
    Bonnet, Madeleine
    PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, : 743 - +
  • [44] Evaluation of a Zero-Watermarking-Type Steganography
    Ishizuka, Hirokazu
    Echizen, Isao
    Iwamura, Keiichi
    Sakurai, Koichi
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 613 - 624
  • [45] Robustness evaluation of transactional audio watermarking systems
    Neubauer, C
    Steinebach, M
    Siebenhaar, F
    Pickel, J
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 12 - 20
  • [46] Nested object watermarking: transparency and capacity evaluation
    Vielhauer, Claus
    Schott, Maik
    Kraetzer, Christian
    Dittmann, Jana
    SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819
  • [47] An Evaluation of Static Java']Java Bytecode Watermarking
    Hamilton, James
    Danicic, Sebastian
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS 1 AND 2, 2010, : 1 - 8
  • [48] A Clean Novel Watermarking Technique Using Chaotic Logistic Map and Multiple Embedding
    Hussain, Md Anwar
    TENTH INTERNATIONAL CONFERENCE ON GRAPHICS AND IMAGE PROCESSING (ICGIP 2018), 2019, 11069
  • [49] Non Blind Digital Watermarking Technique Using DCT and Cross Chaos Map
    Pradhan, Chittaranjan
    Saxena, Vilakshan
    Bisoi, Ajay Kumar
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, DEVICES AND INTELLIGENT SYSTEMS (CODLS), 2012, : 274 - 277
  • [50] Data Quality Evaluation in Medical Database Watermarking
    Franco-Contreras, Javier
    Coatrieux, Gouenou
    Massari, Philippe
    Darmoni, Stefan
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Roux, Christian
    DIGITAL HEALTHCARE EMPOWERING EUROPEANS, 2015, 210 : 276 - 280