scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Robust optical watermarking technique by optimizing the size of pixel blocks of orthogonal transform

TL;DR: A new robust technique of opticalWatermarking that varies the size of pixel blocks by a trade-off in the efficiency of embedded watermarking is proposed, which revealed the effectiveness of the proposed technique.
Journal ArticleDOI

An improved sample projection approach for image watermarking

TL;DR: An improved sample projection approach (ISPA) is presented by introducing a set of modified codelines to decrease embedding distortion and constructing the long line segments to increase robustness and a theoretical expression for the symbol error rate of the ISPA against additive white Gaussian noise (AWGN) attack is derived.
Book ChapterDOI

Hidden QIM Watermarking on Compressed Data Using Channel Coding and Lifting

TL;DR: The scope of application of channel coding on compressed host data for watermarking using dither modulation (DM) based quantization index modulation (QIM) and lifting based wavelet is used to decompose the encoded compressed data in integer coefficients.
Journal ArticleDOI

Imperceptible–Visible Watermarking to Information Security Tasks in Color Imaging

TL;DR: A new improved IVW algorithm for copyright protection that can deliver additional information to the image content is presented and overcomes several drawbacks reported in previous algorithms, including geometric and image processing attacks such as JPEG and JPEG2000.
Proceedings ArticleDOI

UWS Broker for Ubiquitous Web Services Dynamic Discovery

TL;DR: The UWS Broker is introduced, which is a middleware to discover services dynamically in ubiquitous environments that is SOA oriented and is devised for different network based devices and services.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.