scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Source cell-phone recognition from recorded speech using non-speech segments

TL;DR: Experimental results using Mel-frequency and linear frequency cepstral coefficients (MFCC and LFCC) show that features extracted from the non-speech segments of speech contain higher mutual information and yield higher recognition rates than those from speech portions or the whole utterance.
Journal ArticleDOI

A novel blind reversible method for watermarking relational databases

TL;DR: This article introduces a novel blind reversible water marking method that ensures ownership protection in the field of RDB watermarking, whereas previous techniques have been mainly concerned with introducing permanent errors into the actual data, this approach ensures 100% recovery of the original database relation after the watermark has been detected and authenticated.
Journal ArticleDOI

An Efficient Watermarking Technique for the Protection of Fingerprint Images

TL;DR: In this article, the authors embed the watermarks into the ridges area of the fingerprint images so that the technique is inherently robust, yields imperceptible watermarks, and resists well against cropping and/or segmentation attacks.

A survey on steganography techniques in real time audio signals and evaluation

TL;DR: The general principles of hiding secret information using audio technology, and an overview of current functions and techniques are surveyed to construct a useful and useful data hiding application.
Journal ArticleDOI

Robust gray-scale logo watermarking in wavelet domain

TL;DR: The experimental results show better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks and superiority is carried out by comparison made by us with the existing schemes.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.