Watermarking digital image and video data. A state-of-the-art overview
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.Abstract:
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.read more
Citations
More filters
Journal ArticleDOI
Robust and Transparent Color Modulation for Text Data Hiding
TL;DR: This work presents a detection metric and an analysis determining the detection error rate in TCM, considering an assumed print and scan (PS) channel model, and a perceptual impact model is employed to evaluate the perceptual difference between a modified and a non-modified character.
ResearchArticle An Efficient Watermarking Technique for the Protection of Fingerprint Images
TL;DR: The rationale is to embed the watermarks into the ridges area of the fingerprint images so that the technique is inherently robust, yields imperceptible watermarks, and resists well against cropping and/or segmentation attacks.
Proceedings ArticleDOI
Streaming video and rate scalable compression: what are the challenges for watermarking?
TL;DR: In this article, the issues involved in the watermarking of rate-scalable video streams delivered using a practical network are addressed and a review of streaming video is presented, including scalable video compression and network transport.
Journal ArticleDOI
Fibonacci Based Key Frame Selection and Scrambling for Video Watermarking in DWT---SVD Domain
TL;DR: A new technique for video copyright namely Fibonacci based keyframe selection and scrambling for video watermarking in DWT–SVD is introduced and the experimental results show that the proposed methodology resists different image and video processing attacks.
Journal ArticleDOI
Collusion-resilient fingerprinting by random pre-warping
TL;DR: This work proposes a novel collusion-resilience mechanism, wherein the host signal is warped randomly prior to watermarking, and demonstrates the effectiveness of this approach on digital images.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Image coding based on a fractal theory of iterated contractive image transformations
TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.