scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks.

TL;DR: In this paper, a comprehensive adversarial evaluation of 10 representative watermarking schemes against six of the existing attacks was conducted and it was shown that each of them lacks robustness against at least two attacks.

Analysis and Implementation of Different Digital Image Watermarking Techniques for Secure Data Transmission

TL;DR: This paper surveys the features and concepts pertaining to the popular watermarking techniques and analyzes them to evaluate with metrics such as Time complexity, PSNR ,PSR ,MSE values and similarity measure of watermarks based on implementation.
Book ChapterDOI

Optimal detection of transform domain additive watermark by using low density diversity

TL;DR: A set of formulas are developed to predict the watermark retrieval BER in the presence of distortions due to MPEG encod-ing/decoding operations, cropping attacks, selective DCT-domain embedding, and linear filtering on the watermarked video subject to watermark amplitude and spreading factor variation.
Proceedings ArticleDOI

An Efficient Authorship Protection Scheme for Shared Multimedia Content

TL;DR: This paper proposes a robust scheme that uses digital invisible watermarking and hashing to protect the authorship of the digital content and provide resistance against malicious manipulation of multimedia content.
Proceedings ArticleDOI

Improving Invisibility of Blind Video Watermarking Scheme

TL;DR: Modifying the wavelet coefficients depending only on the logo object's pixels will highly improve the invisibility and at the same time providing a good robustness level.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.