scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings Article

Digital audio watermarking for QoS assessment of MP3 music signals

TL;DR: This work proposes an audio watermarking signal processing technique to provide a quality assessment of the received audio signal after a coding/transmission process and the results obtained through simulation trials confirm the validity of such approach.
Proceedings ArticleDOI

Using intrinsically irreversible adaptive technologies to counteract the deceptions in digital watermarking

TL;DR: To effectively counteract the deceptions in multimedia ownership verification, the reversibility in the widely used and researched adaptive watermarking is investigated from a new point of view.

Digital Rights Protection - a Great Challenge

TL;DR: The paper discusses thenecessity of intellectual rights protection generally and the concepts ofDRM intoday's life, and presents the state of art concerning encryption and watermarking, themaintechnical solutions forDRM, and discusses the challenges and newdirections for this topic.
Book ChapterDOI

Optimized Watermarking Scheme for Copyright Protection of Medical Images

TL;DR: In this article , an effective copyright protection algorithm for medical images uses particle swarm optimization (PSO) to provide robust, hybrid, and blind watermarking, which is selected using PSO based on the medical image and watermark information.
Journal ArticleDOI

A novel secured Euclidean space points algorithm for blind spatial image watermarking

TL;DR: In this paper , a new Euclidean space point's algorithm is proposed to authenticate the images by embedding binary logos in the digital images in the spatial domain, and the proposed watermarking methodology is tested on the standard set of raw grayscale and RGB color images.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.