Watermarking digital image and video data. A state-of-the-art overview
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.Abstract:
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.read more
Citations
More filters
Journal ArticleDOI
Adaptive, scalable and robust watermarking for wavelet-based progressive image transmission
TL;DR: The proposed approach enables scalable watermark detection and provides robustness against progressive wavelet image compression and is a suitable candidate for providing efficient authentication for progressive image transmission applications especially over heterogeneous networks, such as the Internet.
Proceedings ArticleDOI
Adaptive Watermarking Model and Detection Performance Analysis
Rongrong Ni,Qiuqi Ruan +1 more
TL;DR: A general model to describe the adaptive watermarking system is constructed and the detection performance based on the normalized similarity measurement is analyzed in details.
Book ChapterDOI
Digital Video Watermarking Using Motion Detection and Singular Value Decomposition
Sanjana Sinha,Swarnali Pramanick,Ankul Jagatramka,Prajnat Bardhan,Dipak K. Kole,Aruna Chakraborty +5 more
TL;DR: This work has adopted an imperceptible video watermarking approach based on Motion Detection and Singular Value Decomposition and tested for its robustness against attacks for watermark degradation and removal.
Dissertation
Digital camera identification using sensor pattern noise for forensics applications
TL;DR: An image sharpening technique is proposed as a pre-processing approach for source camera identification and an improved version of the locally adaptive discrete cosine transform filter is proposed in the filtering stage to reduce the effect of scene details on noise residues.
Journal ArticleDOI
Image watermarking resistant to combined geometric and removal attacks
TL;DR: An improved autocorrelation function (ACF)-based watermarking that is robust against combined geometric and removal attacks and uses the information of an original image more actively during the embedding process, so that the marked image has strong autOCorrelation peaks.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Image coding based on a fractal theory of iterated contractive image transformations
TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.