scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

BER formulation for the blind retrieval of MPEG video watermark

TL;DR: A multiple watermarks embedding scheme based on multi-stage vector quantisation (VQ) has superior features than traditional VQ-based watermarking schemes not only in security, encoding time, and codebook storage space, but also in secret sharing ability.
Proceedings ArticleDOI

Improvement of watermark detection process based on Bayesian estimation

TL;DR: The watermark detection problem is formulated as a kind of blind deconvolution problem, and a watermarks detection method using Bayesian estimation is proposed usingBayesian estimation.
Journal ArticleDOI

Robust digital image watermarking scheme using wave atoms with multiple description coding

TL;DR: The experimental results indicate that superiority of the proposed method against common attacks such as JPEG compression, Gaussian noise addition, median filtering, salt and pepper noise, etc., compared with the existing watermarking schemes using multi-scale transformations.
Proceedings ArticleDOI

Informed embedding for multibit watermarking

R.A. Silva, +1 more
TL;DR: The proposed system is analogous to code division multiplexing in spread spectrum communications and good system performance considering watermark properties of fidelity, efficiency, data payload and robustness against volumetric distortion sources is confirmed.

Geometric Distortion in Image and Video Watermarking. Robustness and Perceptual Quality Impact

I. Setyawan
TL;DR: This thesis discusses the two aspects of the geometric distortion problem, namely the watermark desynchronization aspect and the perceptual quality assessment aspect, and proposes a novel approach to quantify the perceptualquality impact of geometric distortion.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.