scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Robust Multibit Decoding and Detection of Multiplicative Watermarks for Fingerprint Images

TL;DR: The proposed detector and decoder have been shown to outperform similar detectors/decoders existing in the literature and show that the overall performances of both decoder and detector are dependent on the fingerprint image characteristics, namely, on the size of the ridges area relative to the sizes of the fingerprint images.

Web Based Novel Technique for Watermarking Colour Images on Android Mobile Phones

TL;DR: A real time, ubiquitous and novel technique for automatically watermarked the color images for android mobile phone is discussed and demonstrated and various watermarking algorithms can also be implemented with ease.
Book ChapterDOI

A Unified Approach Towards Multimedia Watermarking

TL;DR: This chapter describes three imperceptible and robust watermarking algorithms for different types of multimedia objects based on cascading two powerful mathematical transforms; the Discrete Wavelet Transform (DWT), and the Singular Value Decomposition (SVD).
Book ChapterDOI

Multimedia Information Security and Privacy: Theory and Applications

TL;DR: This chapter has reviewed various data encryption standards, image/video encryption algorithms, and joint compression-encryption methodologies, and the authors have also presented different categories of information hiding methodologies as well as data embedding strategies for digital image/ video contents.

Combined DCT – CS Theory based Digital Watermarking Technique for Color Images

TL;DR: A digital watermarking technique using new signal processing theory called compressive sensing have been implement and analysis for different embedding monochromic watermark images into color cover images.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.