Watermarking digital image and video data. A state-of-the-art overview
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.Abstract:
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.read more
Citations
More filters
Book ChapterDOI
Copyright Protection of Relational Database Systems
TL;DR: An efficient database watermarking algorithm based on inserting a binary image watermark in Arabic character attributes is proposed and demonstrated to be robust against common database attacks.
Proceedings ArticleDOI
Video error correction using data hiding techniques
D.L. Robie,R.M. Mersereau +1 more
TL;DR: This MPEG-2 compliant codec uses data hiding to transmit error correction information and several error concealment techniques in the decoder, which provides for a much higher quality picture in an error-prone environment while creating an almost imperceptible degradation of the picture in a error free environment.
Proceedings ArticleDOI
Robust DCT based video watermarking algorithms for assorted watermarks
TL;DR: The paper focuses on convinced algorithms to embed diverse watermarks in the video frames using Discrete Cosine Transform in concise and its explication to the application in video watermarking.
Journal ArticleDOI
Optical image cryptosystem based on adaptive steganography
Cheng-Hung Chuang,Guo-Shiang Lin +1 more
TL;DR: Experimental results show that the proposed adaptive steganographic scheme is superior to that of a previous one due to Lin et al., no matter what embedding domain, quantization level, and message size are used.
Book ChapterDOI
Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics
TL;DR: This paper provides a review and analysis of the main computational intelligence approaches, including Artificial Neural Networks (ANNs) and Fuzzy Sets (FSs), which are employed in information hiding.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Image coding based on a fractal theory of iterated contractive image transformations
TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.