scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram

TL;DR: While an RDH method generally needs to memorize a set of image-dependent parameters for hidden data extraction and original image recovery, the proposed method is free from parameter memorization by introducing two mechanisms; restriction of histogram modification and parameter hiding prior to data hiding.
Proceedings ArticleDOI

Complexity-scalable compensation of geometrical distortions in image watermarking

TL;DR: This paper presents an efficient method for inverting geometrical distortions that may spatially desynchronise a watermark detector using an orthogonal polynomial mapping, which is efficiently scalable in complexity.
Patent

Content segmentation of watermarking

TL;DR: In this paper, the authors proposed a method for providing a data stream comprising a plurality of content elements, where at least one of two or more copies of a first content element of the data stream has been watermarked with a different watermark.
Proceedings ArticleDOI

A New Pre-processing Approach to Improve DCT-Based Watermarkings Extraction

TL;DR: Experimental results show that extraction performance of DCT-based watermarking algorithm is improved by applying the proposed pre-processing scheme before watermark extraction procedure.
Proceedings ArticleDOI

An Image Watermarking Method using the Lifting Wavelet Transform

TL;DR: This paper proposes a new watermarking method for images using the lifting wavelet transform that can divide watermarked content into watermark and original content perfectly after watermark detection, and realizes digital watermarks for multimedia contents like medical images, electric documents, computer programs, and data.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.