Watermarking digital image and video data. A state-of-the-art overview
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.Abstract:
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.read more
Citations
More filters
Journal ArticleDOI
Secure multimedia authoring with dishonest collaborators
TL;DR: The weaknesses of standard proof-of-ownership watermarking approaches against dishonest insiders are described and several possible architectures for systems that avoid these weaknesses are proposed.
Journal ArticleDOI
Steganography Literature Survey, Classification and Comparative Study
TL;DR: This paper first presents a literature survey of information hiding, then classifies the proposed methods, and finally introduces a comparative study between the different methods.
Proceedings ArticleDOI
Optimal histogram modification with MSE metric
M. Mese,P.P. Vaidyanathan +1 more
TL;DR: A method to modify the histogram of a signal to a desired specific histogram such that the error between the input and output signal is minimized and the output signal has the desired histogram is proposed.
Journal ArticleDOI
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
TL;DR: This paper focuses on the watermarking technique and gives a detailed exposition that includes an experimental evaluation of its quality, and exploits information visualization and machine learning techniques in order to achieve efficient and effective intrusion detection.
Journal ArticleDOI
Video waterscrambling: towards a video protection scheme based on the disturbance of motion vectors
TL;DR: A new video protection model, called waterscrambling, is proposed, whose aim is to give a quality degradation-based security model and allows embedding of a classical invisible watermark enabling protection against mass distribution.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Image coding based on a fractal theory of iterated contractive image transformations
TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.