Watermarking digital image and video data. A state-of-the-art overview
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.Abstract:
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.read more
Citations
More filters
Posted Content
A Watermarking Technique Using Discrete Curvelet Transform for Security of Multiple Biometric Features
TL;DR: ABiometric watermarking technique with multiple biometric watermarks are proposed in which biometric features of fingerprint, face, iris and signature is embedded in the image, which can use for multiple copyright authentication and verification.
Proceedings ArticleDOI
Maximum Likelihood Decoder For Image Watermarking Techniques
TL;DR: In this paper, the authors extended a general approach for extracting the watermark using a mathematical technique for watermarking using Discrete Wavelet Transform (DWT) using the principle of Maximum Likelihood (ML) estimation and is based upon the statistical modeling of parameters of Gaussian distribution.
Proceedings ArticleDOI
Detection of electrode asymmetry in electrochemical noise analysis
TL;DR: In this article, the cross correlation between voltage and current noise is used to detect an asymmetry in an electrochemical noise resistance calculation of an asymmetric pair of electrodes, which can be used for corrosion rate estimation.
Journal ArticleDOI
Research for Robust Watermarking Algorithm Using Least Significant Bit
TL;DR: Experimental results show that the watermarked image almost has no difference from the original host image, and the quality of the extracted image is satisfying, the capacity of this algorithm is high.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Image coding based on a fractal theory of iterated contractive image transformations
TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.