Watermarking digital image and video data. A state-of-the-art overview
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.Abstract:
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.read more
Citations
More filters
Proceedings ArticleDOI
On the spectral singularities of watermarked audio
TL;DR: To improve the robustness of watermarking, the spectral singularities resulting from the widely used noise-like author keystream are investigated with audio signals to eliminate the phenomenon or temper its effect.
Detection of Data Lineage with 1-out-of-n way
Sonali Vijay Patil,Baban Thombre +1 more
TL;DR: This work develops and analyzes the data transfer protocol in a malicious environment between two entities using oblivious transfer, robust watermarking, and signature primitives, and presents a LIME data lineage framework for data flow across various locations.
Proceedings ArticleDOI
Robust digital image watermarking based on normalization and the two dimensional complex wavelet transform
Serap Kazan,Cabir Vural +1 more
TL;DR: A new digital image watermarking algorithm based on moment-based image normalization and the two dimensional complex wavelet transform (2D-CWT) was developed that satisfies both transparency and robustness requirements.
Digital Video Watermarking Techniques: A Review Study
TL;DR: The notion of video watermarking technology is introduced, including its applications, properties, performance requirements and typical algorithms.
Proceedings ArticleDOI
Watermarking textures in video games
TL;DR: A novel watermarking scheme for DDS textures in video games is proposed that embeds the watermark message directly in the compressed stream in DDS files and can be straightforwardly applied in watermark container technique for real-time embedding.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Image coding based on a fractal theory of iterated contractive image transformations
TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.