scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

A Comparative Analysis of Wavelet Families for Invisible Image Embedding

TL;DR: The performance of wavelet functions, viz., Haar, Daubechies, symmetric, and biorthogonal for invisible image embedding is analyzed and the embedding and extraction processes are deployed using the number theory concept of embedding.
Proceedings ArticleDOI

An Analytical Framework for Comparative Analysis of Various Watermarking and Steganographic Techniques

TL;DR: This paper presents a framework for analyzing and evaluating the strengths of various watermarking algorithms and focuses exclusively on the analysis of water marking of digital images.
Book ChapterDOI

The Potential Impact of Video Manipulation and Fraudulent Simulation Technology on Political Stability

TL;DR: In this paper, video manipulation and fraudulent simulation technology combines facial recognition with a neural network to allow its users to create fake impersonations of public figures, leading to a rise in incidents stemming from fake news, imitation of authority, and plausible deniability.
Dissertation

Digital image watermarking by using intermediate significant bits in gray scale images

Ali Sharifara
TL;DR: The proposed method aims to embed watermark in different bit planes of host image which can improve both the visual quality and robustness, and a Zig-zag algorithm is also recommended to change the order of embedding in watermarked image.
Journal ArticleDOI

Effects of JPEG Compression on Reading Optical Watermarking Embedded by Using Color-Difference Modulation

TL;DR: The simulation results showed that the accuracy in reading out embedded information decreases when captured images are compressed, however, for medium-level or low compression rates 100% accuracy can be expected by using the error correction technique.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.