scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Robust Reversible Data Hiding Scheme Based on Gravity Center Difference

TL;DR: Experimental results show that the original image can be recovered without any distortion after the hidden data have been extracted if the stego image has not been altered.
Journal ArticleDOI

A Multi-Level Robust and Perceptually Transparent Blind Audio Watermarking Scheme Using Wavelets

TL;DR: The simulation results obtained show that the proposed watermarking scheme is resilient to various attacks except cropping, and the robustness of the scheme is evaluated by applying different attacks such as filtering, sampling rate alteration, compression, noise addition, amplitude scaling, and cropping.
Patent

Adaptive video fingerprinting

TL;DR: In this article, a method and system for embedding and recovering a spatial fingerprint in a sequence of video frames is presented, where a portion of the spatial fingerprint is embedded in each marked group of a first subgroup of the marked groups, and an ordering of the portion embedded in the first sub-group is used to determine whether the frame is a marked frame.
Book ChapterDOI

Cohort Intelligence with Cognitive Computing (CICC) and Modified-Multi Random Start Local Search (M-MRSLS) Optimization Algorithms for JPEG Image Steganography (Approach 1 and Approach 2)

TL;DR: The JPEG image format (Miano in Compressed image file formats: JPEG, PNG, GIF, XBM, BMP) is commonly used in various steganography techniques such as least significant bit insertion, masking, and filtering, transformations, etc.
Proceedings ArticleDOI

Optimum detection of robust perceptual-model-based image-adaptive watermarks

TL;DR: The optimum detector for the perceptual-model-based robust watermarking is constructed, and the performance analysis is investigated, finding the new detector asymptotically is most efficient for weak signals, and particularly it is the most powerful for the perceivable- model-constrained watermarks.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.