scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Robust reference-watermarking scheme using wavelet packet transform and bidiagonal-singular value decomposition

TL;DR: This paper presents a new robust reference watermarking scheme based on wavelet packet transform (WPT) and bidiagonal singular value decomposition (bSVD) for copyright protection and authenticity that is able to withstand a variety of attacks.
Proceedings ArticleDOI

A Robust Dual Digital-Image Watermarking Technique

TL;DR: A robust dual watermarking technique is suggested that incorporates two watermarks in a host image for improved protection and robustness and is robust to wide variety of attacks.
Proceedings ArticleDOI

A blind watermarking scheme for depth-image-based rendered 3D video using the dual-tree complex wavelet transform

TL;DR: A digital watermarking method for depth-image-based rendered 3D video to protect each centre, left, and right view from the most common video distortions which include geometric attacks such as scaling, rotation and cropping as well as lossy JPEG compression and additive noise.

Video Watermarking Algorithms Using the Svd Transform

TL;DR: Two effective, robust and imperceptible video watermarking algorithms are proposed based on the algebraic transform of Singular Value Decomposition (SVD), which achieved better robustness results, while the block-wise algorithm gave higher data payload rate.
Journal ArticleDOI

Efficient Approach towards Detection and Identification of Copy Move and Image Splicing Forgeries Using Mask R-CNN with MobileNet V1

TL;DR: This research work presents Mask R-CNN with MobileNet, a lightweight model, to detect and identify copy move and image splicing forgeries and provides a forged percentage score for a region in an image.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.