scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Hybrid domain watermarking technique for copyright protection of images using speech watermarks

TL;DR: A watermarking technique based on various signal processing transforms is proposed and implemented for the security of image using human speech signal and performs better than the existing water marking techniques available in the literature.
Proceedings ArticleDOI

A temporal desynchronization resilient video watermarking scheme based on independent component analysis

TL;DR: Simulations show that this proposed video watermarking scheme is robust not only to temporal desynchronization, e.g., frame swapping, frame dropping, fps conversion, etc, but to most of the common video processing/attacks, E.g. noising, filtering, rescaling, MPEG2-4 transcoding, and intra-video collusion.
Journal ArticleDOI

Watermarking of ultrasound medical images in teleradiology using compressed watermark.

TL;DR: TDARWMI scheme development to be used for ROI authentication, tamper detection, localization, and lossless recovery was compared and found to be better than other watermarking schemes.
Journal ArticleDOI

A multi-tier security system (SAIL) for protecting audio signals from malicious exploits

TL;DR: The obtained result ratifies better level protection of audio signals from different security threats and can be recommended for multi channel audio processing.
Journal ArticleDOI

An image watermarking based on the pdf modeling and quantization effects in the wavelet domain

TL;DR: An image watermarking technique based on the concept of JPEG2000 algorithm is proposed, using biorthogonal wavelet 9/7 transform to provide a set of coefficients suitable for watermark embedding.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.