scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising

TL;DR: This paper presents a blind low frequency watermarking scheme on gray level images, which is based on DCT transform and spread spectrum communications technique and proves to be highly resistant in cases of compression and additive noise, while preserving high PSNR for the watermarked images.
Proceedings ArticleDOI

Analysis and comparison of holographic and traditional digital image watermarking in DWT domain

TL;DR: Test results show that the hidden images of holographic water marking survive geometric distortion more than the traditional one, especially cropping, and the Gaussian filter, Gaussian noise and JPEG compress resilient properties of traditional watermarking are a little better than the holographicWatermarking.
Proceedings ArticleDOI

An Industrial Watermarking Process for Plastic Card Supports

TL;DR: This paper investigates a robust method to watermark and decode images such as identity pictures printed on plastic card supports that have a special interest in industrial areas requiring secure authentication.
Journal ArticleDOI

Blind Watermarking of Color Images Using Karhunen–Loève Transform Keying

TL;DR: The proposed scheme performs a decorrelation of the RGB color bands of the image to be watermarked using a Karhunen–Loeve transform, then marks the coefficients of the KLT of the first band obtained, maintaining at the same time a high image quality.
Proceedings ArticleDOI

An image watermarking method based on the singular value decomposition and the wavelet transform

TL;DR: A robust image watermarking scheme in which a binary image is embedded in the singular values of selected DWT blocks in the horizontal and vertical sub-bands of a 1-level decomposition of a gray-scale image is proposed.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.