Watermarking digital image and video data. A state-of-the-art overview
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.Abstract:
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.read more
Citations
More filters
Book ChapterDOI
Two-step detection algorithm in a HVS-based blind watermarking of still images
Yong C. Kim,Byeong Cheol Choi +1 more
TL;DR: Experimental results show that the proposed method based on HVS method gives strong robustness to the attacks compared with conventional DCT, wavelet and DFT watermarking methods.
Journal ArticleDOI
Analysis of position based watermarking
Koerich Borges,J. Mayer +1 more
TL;DR: This paper extends the position based watermarking technique and provides a detailed performance analysis considering additive white Gaussian noise and collusion attacks and significantly improves the tradeoff between fidelity and robustness by exploiting the informed embedding and informed coding paradigms.
Proceedings ArticleDOI
Enhanced the security of image steganography through image encryption
Rupali Bhardwaj,Divya Khanna +1 more
TL;DR: The primary purpose of this paper is to provide two levels of security through a two step process, rather than hidden the message bits directly in cover image, they are scrambled in a random order generated by 2D Arnold Cat Map after that encrypted message is hidden behind a cover image using basic LSB method.
Proceedings ArticleDOI
Evaluation of Watermarking Low Bit-rate MPEG-4 Bit Streams
TL;DR: A novel watermarked algorithm for watermarking low bit-rate MPEG-4 compressed video is developed and evaluated and the visibility and the robustness of the watermark after decompression, rotation, scaling, sharpening, noise reduction, and trans-coding are evaluated.
Journal ArticleDOI
Digital image ownership authentication via camouflaged unseen-visible watermarking
Oswaldo Ulises Juarez-Sandoval,Manuel Cedillo-Hernandez,Mariko Nakano-Miyatake,Antonio Cedillo-Hernandez,Hector Perez-Meana +4 more
TL;DR: This work proposes a camouflaged, unseen-visible watermarking technique based on luminance and texture properties in conjunction with an image enhancement criterion that has some advantages over invisible and visible water marking methodologies in terms of readability and imperceptibility of the watermark.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Image coding based on a fractal theory of iterated contractive image transformations
TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.