scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Multiplicative Watermark Decoder in Contourlet Domain Using the Normal Inverse Gaussian Distribution

TL;DR: The results show that the proposed watermark decoder is superior to other decoders in terms of providing a lower bit error rate and is highly robust against various kinds of attacks such as noise, rotation, cropping, filtering, and compression.
Journal ArticleDOI

Temporal synchronization in video watermarking

TL;DR: A watermark more resilient against temporal synchronization attacks is designed by adding temporal redundancy in the watermark construction by developing new models for watermark embedding and detection.
Journal ArticleDOI

A New Statistical Detector for DWT-Based Additive Image Watermarking Using the Gauss–Hermite Expansion

TL;DR: Experimental results demonstrate that the proposed watermark detector performs better than other standard detectors such as the Gaussian and generalized Gaussian, in terms of the probabilities of detection and false alarm as well as the efficacy.
Proceedings ArticleDOI

Protecting Fingerprint Data Using Watermarking

TL;DR: This work introduces an application of wavelet-based watermarking method to hide the fingerprint minutiae data in fingerprint images and can also be used to protect the original fingerprint image.
Journal ArticleDOI

Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique.

TL;DR: This paper focuses on watermarking of ultrasound medical images with Lempel-Ziv-Welch (LZW) lossless-compressed watermarks, which is the combination of defined region of interest (ROI) and imageWatermarking secret key and the performance of the LZW compression technique was compared with other conventional compression methods based on compression ratio.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.