Watermarking digital image and video data. A state-of-the-art overview
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.Abstract:
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.read more
Citations
More filters
Book ChapterDOI
An Introduction to Robust Transform Based Image Watermarking Techniques
Xi Zhao,Anthony T. S. Ho +1 more
TL;DR: In this chapter, the fundamental concept of digital watermarking, differences between visible and invisible water marking, blind and non-blind watermark detection schemes, robust, fragile and semi-fragileWatermarking algorithms, as well as four important properties for digital waterMarking: imperceptibility, robustness, capacity and security will be described.
Proceedings ArticleDOI
Rotation, scale and translation invariant image watermarking using Radon transform and Fourier transform
TL;DR: A novel digital image-watermarking scheme that is invariant to rotation, scale and translation (RST) attacks is presented, using an invariant centroid as the origin of Radon transform and 2-D Fourier transform.
Book ChapterDOI
Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video
TL;DR: Experimental results reveal that the proposed scheme can achieve enough robustness while preserving the perceptual quality, and a blind video watermarking algorithm for H.264/AVC is proposed.
Proceedings ArticleDOI
A hybrid semi-blind gray scale image watermarking algorithm based on DWT-SVD using human visual system model
Rajesh Mehta,Navin Rajpal +1 more
TL;DR: The experimental results show that HVS model based hybrid image watermarking scheme is imperceptible and robust against several image processing operations like JPEG compression, median filtering, sharpening, cropping and addition of Gaussian noise.
Journal ArticleDOI
A motion location based video watermarking scheme using ICA to extract dynamic frames
TL;DR: In this article, independent component analysis is used to extract a dynamic frame from two successive frames of original video, and the motion is located by using the variance of 8 × 8 block in the extracted dynamic frame.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Image coding based on a fractal theory of iterated contractive image transformations
TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.