scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Reversibility, Deceptions, and Counteractions in Adaptive Digital Watermarking

Zhao Xian-feng
- 01 Jan 2002 - 
TL;DR: Making watermarks and scaling factors one-way dependent on original data, and exploiting the human perceptual system, help watermarking become resistant to the above attacks and more reliable in ownership verification.
Book ChapterDOI

Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking

TL;DR: To overcome the reversibility of the widely researched adaptive watermarking, the existing method based on cryptography is first directly revised for adaptive systems and is more efficient because it disposes of any cryptographic processing, such as hashing and stream generation.
Proceedings ArticleDOI

Efficient Text Color Modulation for Printed Side Communications and Data Hiding

TL;DR: This work presents a detection metric and an analysis determining the detection error rate in TCM, considering an assumed print and scan (PS) channel model, and a perceptual impact model is employed to evaluate the perceptual difference between a modified and a non-modified character.

A nonoblivious watermarking scheme for embedding spread spectrum-like watermarks in the wavelet domain

TL;DR: A multiresolution watermarking method for copyright protection of digital images based on the discrete wavelet transform that is robust against wide variety of attacks is introduced.

Video Watermarking in Motion vectors Based on visual masking

TL;DR: A novel hybrid digital video watermarking scheme embedding watermark in P-frames using the set of non-linear formulas that have been proposed, according to the entropy of motion information of every macro-block and the human visual masking system is proposed.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.