scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

A DCT-SVD based robust watermarking scheme for grayscale image

TL;DR: A robust watermarking scheme which employs both the Discrete Cosine Transform (DCT) and the Singular Value Decomposition (SVD) and is able to resist a variety of image processing attacks/operations like image enhancement, image noising, cropping operation, JPEG compression etc.
Proceedings ArticleDOI

Separable reversible data hiding in encrypted images with histogram permutation

TL;DR: A new method of separable reversible data hiding (RDH) for encrypted images in which hidden data can be extracted from an encrypted image conveying hidden data without image decryption is proposed.
Journal ArticleDOI

RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform

TL;DR: Three-level discrete wavelet transform (DWT) is applied to the original image and the proposed scheme achieves good performance of imperceptibility and robustness against common image processing and malicious attacks, especially geometric attacks.
Journal ArticleDOI

A New Robust Blind Watermarking Scheme Based on Steerable pyramid and DCT using Pearson product moment correlation

TL;DR: The experimental results demonstrate good visual imperceptibility and resiliency of the proposed scheme against an intentional and un-intentional variety of attacks.
Proceedings ArticleDOI

Scene-based watermarking method for copy protection using image complexity and motion vector amplitude

TL;DR: By using a new watermarking method based on scene segmentation for copy protection in hard disk drive embedded digital broadcast receivers, invisibility and robustness of watermark are satisfied at the same time.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.