scispace - formally typeset
Journal ArticleDOI

A Watermarking Technique based on the Frequency Domain

TLDR
The experimental results have demonstrated that the proposed scheme has satisfied the basic requirements of watermarking such as robustness and imperceptible, and can used to resist the JPEG attach and avoid the some weaknesses of JPEG quantification.
Abstract
A watermarking technique based on the frequency domain is presented in this paper. The one of the basic demands for the robustness in the watermarking mechanism should be able to dispute the JPEG attack since the JPEG is a usually file format for transmitting the digital content on the network. Thus, the proposed algorithm can used to resist the JPEG attach and avoid the some weaknesses of JPEG quantification. And, the information of the original host image and watermark are not needed in the extracting process. In addition, two important but conflicting parameters are adopted to trade-off the qualities between the watermarked image and the retrieve watermark. The experimental results have demonstrated that the proposed scheme has satisfied the basic requirements of watermarking such as robustness and imperceptible.

read more

Citations
More filters

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video

TL;DR: A new robust blind video watermark algorithm in transform domain combining with 3D video correlation is proposed that has excellent performance against resolution attack and coding attack, and is obviously better than DCT-based and DFT-based algorithms.
Journal ArticleDOI

Adaptive Halftone Watermarking Algorithm Based on Particle Swarm Optimization

TL;DR: The experimental results show the halftone watermarking algorithm optimized using PSO has better performance, it is robust under smearing attack and cropping attack, and has good resistance to print-and-scan process.
Journal Article

Information hiding watermarking detection technique by psnr and rgb intensity

TL;DR: A new region-adaptive watermarking algorithm is proposed which will be used for the novel application to detect watermark attacks and improves the speed of detection, and also test the robustness of the proposed water marking scheme.
Proceedings ArticleDOI

LWT Based Hybrid Digital Watermarking Scheme in YCbCr Colour Space

Mehak Saini
TL;DR: The proposed LWT (Lifting wavelet transform) based hybrid scheme is proved to be more efficient in terms of perpetual quality, computational time and robustness and Peak signal to noise ratio (PSNR) & Correlation coefficient for the proposed scheme are found to be much better than that reported in the literature.
Proceedings ArticleDOI

An efficient video watermarking approach using scene change detection

TL;DR: A method based on DWT-SVD to insert and extract the watermark in an .avi file using a gray scale image as watermark through four different approaches is used to achieve low pay load with high robustness.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Multimedia data-embedding and watermarking technologies

TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Journal ArticleDOI

Hidden digital watermarks in images

TL;DR: The experimental results show that the proposed image authentication technique by embedding digital "watermarks" into images successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group lossy compression.
Journal ArticleDOI

Cryptology for digital TV broadcasting

TL;DR: The description of a conditional access system is given and it is shown that equitable systems need the use of a trusted third party.
Journal ArticleDOI

Machine learning based adaptive watermark decoding in view of anticipated attack

TL;DR: The proposed decoding scheme is able to cope with the alterations in features introduced by a new attack and achieves promising improvement in terms of bit correct ratio in comparison to the existing decoding scheme.
Related Papers (5)