Watermarking digital image and video data. A state-of-the-art overview
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.Abstract:
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.read more
Citations
More filters
Proceedings ArticleDOI
Robust optical watermarking technique by optimizing the size of pixel blocks of orthogonal transform
TL;DR: A new robust technique of opticalWatermarking that varies the size of pixel blocks by a trade-off in the efficiency of embedded watermarking is proposed, which revealed the effectiveness of the proposed technique.
Journal ArticleDOI
An improved sample projection approach for image watermarking
TL;DR: An improved sample projection approach (ISPA) is presented by introducing a set of modified codelines to decrease embedding distortion and constructing the long line segments to increase robustness and a theoretical expression for the symbol error rate of the ISPA against additive white Gaussian noise (AWGN) attack is derived.
Book ChapterDOI
Hidden QIM Watermarking on Compressed Data Using Channel Coding and Lifting
TL;DR: The scope of application of channel coding on compressed host data for watermarking using dither modulation (DM) based quantization index modulation (QIM) and lifting based wavelet is used to decompose the encoded compressed data in integer coefficients.
Journal ArticleDOI
Imperceptible–Visible Watermarking to Information Security Tasks in Color Imaging
Oswaldo Ulises Juarez-Sandoval,Francisco Garcia-Ugalde,Manuel Cedillo-Hernandez,Jazmin Ramirez-Hernandez,Leobardo Hernandez-Gonzalez +4 more
TL;DR: A new improved IVW algorithm for copyright protection that can deliver additional information to the image content is presented and overcomes several drawbacks reported in previous algorithms, including geometric and image processing attacks such as JPEG and JPEG2000.
Proceedings ArticleDOI
UWS Broker for Ubiquitous Web Services Dynamic Discovery
TL;DR: The UWS Broker is introduced, which is a middleware to discover services dynamically in ubiquitous environments that is SOA oriented and is devised for different network based devices and services.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Image coding based on a fractal theory of iterated contractive image transformations
TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.