scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Optimum detection of multiplicative watermarks using locally optimum decision rule

TL;DR: New detector structures for the optimum detection of multiplicative watermarks are derived and it is shown that the observations should be raised to the power of the shape parameter of the distribution before they are correlated with the watermark.
Proceedings ArticleDOI

MPEG-2 digital video watermarking technique

TL;DR: A new compressed domain video watermarking scheme is presented that embeds several binary images decomposed from a single watermarked image into different scenes in a video sequence and incorporates a visual mask based on local image characteristics into the compressed bit streams.
Proceedings ArticleDOI

A Novel Robust Colour Watermarking Scheme for Colour Watermark Images in Frequency Domain

TL;DR: A novel and robust colour water marking scheme of embedding colour watermark into colour host image that is more secure, robust and efficient because of use of DWT and DCT.
Proceedings ArticleDOI

Audio watermarking using wavelets

TL;DR: An imperceptible and robust audio watermarking algorithm based on the discrete wavelet transform (DWT) is described that has been evaluated extensively, and simulation results demonstrate the imperceptibility (inaudibility) and robustness of the proposed algorithm.
Proceedings ArticleDOI

A Robust Digital Watermarking of Satellite Image at Third Level DWT Decomposition

TL;DR: The experimental results demonstrate the efficiency of the proposed scheme, which fulfills the strict requirements concerning alterations of satellite images, and provides a third level DWT decomposition of the satellite image by choosing a region of interest and embedding the watermark in the same.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.