scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Pattern based robust digital watermarking scheme for images

TL;DR: A transform-domain robust digital watermarking technique which uses a pattern-based compression of the watermark image, an intelligent dynamic embedding of the signature bits and a post-watermarking content-based visual masking technique to deliver high image quality and robustness in retaining watermark content against attacks (cropping).
Proceedings ArticleDOI

A DWT-SVD based digital watermarking technique for copyright protection

TL;DR: Analysis and experimental results show much improved performance of the proposed method in comparison with the pure SVD-based watermarking and the technique without using some wavelet function and Experimental results confirm that the proposed scheme provides good image quality of watermarked images.
Journal ArticleDOI

Video scene characteristic detection to improve digital watermarking transparency

TL;DR: A new method of video scene content characteristic detection is proposed, which can be applied in conjunction with digital watermarking schemes in order to improve the transparency and improve imperceptibility.
Journal ArticleDOI

Rate-Distortion-Preserving Forensic Watermarking Using Quantization Parameter Variation

TL;DR: The experimental results prove that the proposed approach retains the rate-distortion performance better than state-of-the-art techniques, and the watermarks are robust to recompression and noise attacks.
Journal ArticleDOI

An improved wavelet domain digital watermarking for image protection

TL;DR: A robust, invisible, non-blind watermarking scheme in the wavelet domain is proposed and provides better resistance to collusion attack also when compared with existing spatial domain approach.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.