scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Video watermark detection in DCT domain for H.264/AVC through a hierarchical prior

TL;DR: This work proposes a two-level hierarchical prior in the framework of intra-coded DCT (Discrete Cosine Transform) coefficients in H.264/AVC video stream, and shows improved detection performance along with improved robustness against different attacks.
Proceedings ArticleDOI

Embedding biometric watermark on document image using discrete wavelet transform

TL;DR: Experimental results show that the proposed method is quite robust to various attacks such as Gaussian White Noise, JPEG Compression and Low-Pass Filters, and is successfully tested for embedding the fingerprint watermark message and extraction even if the watermarked document image has been attacked by some imitated interferences.
Proceedings ArticleDOI

Digital watermarking: An approach based on Hilbert transform

TL;DR: In this paper, the authors proposed an algorithm for embedding and extracting watermark in a host image and analytically obtain a parameter related to this procedure, using extensive simulations, they show that the algorithm performs well even if the host image is corrupted by various attacks.
Proceedings ArticleDOI

Hardware implementation of visible watermarking

TL;DR: The ultimate objective of the research is to develop low power, high performance, real-time, reliable and secured watermarking system which can provide robustness over certain attacks namely cover-up attack, cropping noise, scaling and geometric attacks.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.