scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Digital video watermarking based on 3D-discrete wavelet transform domain

TL;DR: The proposed DWT (discrete wavelet transform) domain is used for proposed a novel algorithm to place invisible watermark in a video frame based on a three-level DWT using Haar filter that is robust against JPEG compression, geometric attacks, and image processing attacks.
Journal ArticleDOI

Protection of the patient data against intentional attacks using a hybrid robust watermarking code.

TL;DR: In this paper, a hybrid spatial domain watermarking algorithm that includes encryption, integrity protection, and steganography is proposed to strengthen the information originality based on the authentication, the proposed algorithm checks whether the patient's information has been deliberately changed or not.
Proceedings ArticleDOI

Coding techniques for data hiding in images

TL;DR: The objective of this paper is to evaluate the improvement that channel codes bring to the embedding algorithm.
Dissertation

Image adaptive watermarking using wavelet transform

T Mita Kumari
TL;DR: The main focus of this thesis is to provide good tradeoff between perceptual quality of the watermarked image and its robustness against different attacks and to demonstrate the feasibility of the digital watermarking algorithms for use in multimedia standards.
Book ChapterDOI

A Hybrid Fusion Technique for Watermarking Digital Images

TL;DR: Experimental evaluations show that combining the two transforms in this manner offers improved performance in terms of imperceptibility, robustness to jpeg and other kinds of attack on the published (watermarked) image and quality of recovered watermark image than is obtainable using the methods that are based solely on the DWT or DCT techniques or their direct combination.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.