scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Oblivious video watermarking using temporal sensitivity of HVS

Alper Koz, +1 more
TL;DR: An oblivious video watermarking method is presented based on the temporal sensitivity of the human visual system (HVS) to determine the maximum strength of the watermark, which still gives imperceptible distortion after watermark insertion.
Journal ArticleDOI

Design and Implementation of a Joint Data Compression and Digital Watermarking System in an MPEG-2 Video Encoder

TL;DR: The proposed system is adequate for a specific function intellectual property (IP) combined with a real-time video capture and a surveillance system and can achieve robust watermarking with high flexibility for joint data compression and low hardware complexity.

Wavelet Tree Quantization for

TL;DR: This paper proposes a wavelet-tree-based blind copyright protection scheme for copyright protection where the watermark is embedded by quantizing super trees, so quantized that they exhibit a large enough statisticalerence which will later be used for watermark extraction.
Journal ArticleDOI

Complex Wavelet-Based Image Watermarking with the Human Visual Saliency Model

TL;DR: A complex wavelet based watermarking algorithm is proposed by using the human visual texture masking and visual saliency model to improve the invisibility and robustness of multiplicative image water marking.

A Novel Digital Watermarking Scheme Using Neural Networks with Tamper Detection Capability

TL;DR: Experimental results demonstrate simultaneous good imperceptibility and high robustness of the method against several types of attacks, such as Gaussian and salt and pepper noise addition, median filtering, and JPEG compression; in addition to capability of detecting even minor changes in the watermarked.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.