Watermarking digital image and video data. A state-of-the-art overview
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.Abstract:
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.read more
Citations
More filters
Proceedings ArticleDOI
DWT-based watermarking technique for video authentication
TL;DR: A wavelet watermarking scheme for video authentication using orthonormal filters, where the Y-components of the video frames are decomposed using DWT, and a watermark is inserted in one or more of the resulting subbands.
Proceedings ArticleDOI
A blind high definition videowatermarking scheme robust to geometric and temporal synchronization attacks
TL;DR: A digital video watermarking technique based on the dual-tree complex wavelet transform that can protect this pirated digital video content from temporal synchronization attacks such as frame dropping and frame rate conversion is proposed.
Proceedings ArticleDOI
Region of Interest Watermarking Based on Fractal Dimension
Rongrong Ni,Qiuqi Ruan +1 more
TL;DR: An image watermarking algorithm that aims to protect the region of interest (ROI) is proposed based on fractal dimension and can robustly resist cropping, patching, and compression.
Proceedings ArticleDOI
A review of image watermarking
TL;DR: This paper presents a review of watermarking where water marking processes are described briefly and the appropriate properties for different applications are discussed.
Journal ArticleDOI
Exploring the Cross-Correlation as a Means for Detecting Digital Watermarks and Its Reformulation Into the Fractional Calculus Framework
Mario Gonzalez-Lee,Hector Vazquez-Leal,José Francisco Gómez-Aguilar,Luis J. Morales-Mendoza,Victor Manuel Jimenez-Fernandez,J.R. Laguna-Camacho,C. Calderón-Ramón +6 more
TL;DR: This paper contributes to a new equation set for detecting watermarks based on fractional calculus principles, and notes that the behavior holds for other embedding domains, for example, the discrete cosine transform coefficients and the singular values decomposition values, which suggests the regularity of the approach.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Image coding based on a fractal theory of iterated contractive image transformations
TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.