scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Security in medical image communication with arnold's cat map method and reversible watermarking

TL;DR: The Region of Interest (ROI) in an image and trying to embed data in Region of Non Interest (RONI) is defined and Arnold's cat map method (Arnold's Transform) is proposed to improve the information security.
Journal ArticleDOI

A Blind Reversible Robust Watermarking Scheme for Relational Databases

TL;DR: This paper proposes a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database and is robust against a variety of data attacks.
Proceedings ArticleDOI

Optimum detection and decoding of multiplicative watermarks in DFT domain

TL;DR: This work investigates the optimal detection and decoding of multiplicative watermarks in DFT domain, and derives locally optimum detector structure and extends it to decoding multiple-bit message in data hiding.
Journal ArticleDOI

Multicarrier spread spectrum watermarking for secure error concealment in fading channel

TL;DR: The integration of SS watermarking with the existing SS modulation not only simplifies the design but also offers significant performance improvement for error concealment in fading channel.
Journal ArticleDOI

Per-separation clustered-dot color halftone watermarks: separation estimation based on spatial frequency content

TL;DR: This work proposes an estimation method that jointly exploits the differences in the spatial periodicities and the color (spectra) of the halftone separations to obtain good estimates of the individual halftones from conventional RGB scans and demonstrates the efficacy of this methodology experimentally in continuous phase modulation for the embedding of independent visual watermark patterns.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.