scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters

Toward robust spread spectrum watermarking of 3D data

Mihai Mitrea
TL;DR: This study addresses the issue of robust watermarking techniques for 3D objects with results that point to firm results concerning all the challenges nowadays stated: transparency, robustness and probability of false alarm.
Journal ArticleDOI

Fast Fallback Watermark Detection Using Perceptual Hashes

TL;DR: This paper proposes to make the fallback watermark detection method faster using perceptual hashes instead of uncompressed secondary watermark signals, which enables fast and more robust detection of watermarks that were embedded by existing watermarking methods.
Proceedings ArticleDOI

A wavelet based image watermarking scheme with a CDMA/Hadamard embedding technique

TL;DR: A new blind digital image watermarking scheme that employs a Hadamard matrix to spread the CDMA watermark in selected DWT coefficients in a gray-level cover image is proposed and is robust against common attacks such as additive Gaussian noise, cropping, low pass filtering, and JPEG compression.
Journal ArticleDOI

Video Copyright Protection Using Chaotic Maps and Singular Value Decomposition in Wavelet Domain

TL;DR: This paper attempts to offer a new method for video copyright protection using Singular Value Decomposition (SVD) and chaotic maps in the discrete wavelet domain that is robust against video processing attacks with better integrity of watermark data with lesser processing time.
Proceedings ArticleDOI

A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks

TL;DR: A hybrid watermarking method joining a robust and a fragile watermark, and thus combining copyright protection and content authentication is proposed, which can resist tampering and copy attacks at the same time.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.