scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Robust and Imperceptible Multiple Watermarking Using Transform Domain Algorithm for Digital Media

TL;DR: In this paper , a robust multiple watermarking method with three transform domain techniques, discrete wavelet transforms (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) for color images was discussed.

Active Spread-Spectrum Steganalysis for Hidden Data Extraction

TL;DR: Experimental studies show that the proposed CC-M-IGLS active SS steganalysis algorithm can achieve probability of error close to what may be attained with known embedding signatures and host autocorrelation matrix.

BLINDERROR-FREEDETECTIONOF TRANSFORM-DOMAIN WATERMARKS MonaA.Sheikh andRichard G.Baraniuk Electrical & Computer Engineering Department RiceUniversity

Houston Tx
TL;DR: This paper proposes anewblind, error-free detection algorithm forwatermarking intransform domains that can be extended to any transform-domain watermarking method, and also beused to watermark already compressed images.
Book ChapterDOI

Blind Audio Watermarking

TL;DR: In this chapter, the blind audio watermarking techniques in the spatial domain, transform domain, and hybrid domain are discussed and the audio water marking techniques using advanced signal transforms such as stationary wavelet transform (SWT) and fast discrete curvelettransform (FDCuT) are discussed with its experimental results.
Proceedings ArticleDOI

High capacity image watermarking in the joint spatio-frequency domain

TL;DR: A robust and high capacity watermarking method that is based on spatio-frequency (SF) representations is presented that uses the discrete evolutionary transform calculated by Gabor expansion to represent an image in the SF domain.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.