scispace - formally typeset
Search or ask a question
Topic

Watermark

About: Watermark is a research topic. Over the lifetime, 20956 publications have been published within this topic receiving 297524 citations.


Papers
More filters
Journal Article
TL;DR: A chuck has a chuck body rotatable about an axis and formed with a plurality of angularly spaced radially extending inner guides and a plurality that is radially displaceable in each of the inner guides.
Abstract: A chuck has a chuck body rotatable about an axis and formed with a plurality of angularly spaced radially extending inner guides and a plurality of angularly spaced and radially extending outer guides. An inner jaw part wholly received within the chuck body is radially displaceable in each of the inner guides and an outer jaw part projecting axially from the chuck body is radially displaceable in each of the outer guides. An operating element is engaged with all of the inner jaw parts to jointly radially displace them. A coupling member is axially displaceable in each of the inner jaw parts between a coupling position in which each of the inner parts is locked for joint radial movement with the respective outer part and an axially offset decoupling position allowing relative radial displacement of the outer jaw parts and the respective inner jaw parts. These coupling members may be independently operable, or jointly operable by means of a cam ring.

581 citations

Journal ArticleDOI
TL;DR: A unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user, and when image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction.
Abstract: With the increasing importance of images in people’s daily life, content-based image retrieval (CBIR) has been widely studied. Compared with text documents, images consume much more storage space. Hence, its maintenance is considered to be a typical example for cloud storage outsourcing. For privacy-preserving purposes, sensitive images, such as medical and personal images, need to be encrypted before outsourcing, which makes the CBIR technologies in plaintext domain to be unusable. In this paper, we propose a scheme that supports CBIR over encrypted images without leaking the sensitive information to the cloud server. First, feature vectors are extracted to represent the corresponding images. After that, the pre-filter tables are constructed by locality-sensitive hashing to increase search efficiency. Moreover, the feature vectors are protected by the secure kNN algorithm, and image pixels are encrypted by a standard stream cipher. In addition, considering the case that the authorized query users may illegally copy and distribute the retrieved images to someone unauthorized, we propose a watermark-based protocol to deter such illegal distributions. In our watermark-based protocol, a unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user. Hence, when image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction. The security analysis and the experiments show the security and efficiency of the proposed scheme.

563 citations

Proceedings Article
01 Sep 1998
TL;DR: In this article, the authors proposed an audio watermarking method that uses a seed known only by the copyright owner to create the watermark signal to be embedded in the audio signal.
Abstract: The audio watermarking method presented below offers copyright protection to an audio signal by modifying its temporal characteristics. The amount of modification embedded is limited by the necessity that the output signal must not be perceptually different from the original one. The watermarking method presented here does not require the original signal for watermark detection. The watermark key is simply a seed known only by the copyright owner. This seed creates the watermark signal to be embedded. Watermark embedding depends also on the audio signal amplitude in a way that minimizes the audibility of the watermark signal. The embedded watermark is robust to MPEG audio coding, filtering, resampling and requantization.

555 citations

Journal ArticleDOI
01 Jul 1999
TL;DR: In this article, the authors proposed a fragile watermarking approach which embeds a watermark in the discrete wavelet domain of the image by quantizing the corresponding coefficients, which allows the user to make application-dependent decisions concerning whether an image which is JPEG compressed for instance, still has credibility.
Abstract: In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We specifically address the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our problem include authentication for courtroom evidence, insurance claims, and journalistic photography. We present a novel fragile watermarking approach which embeds a watermark in the discrete wavelet domain of the image by quantizing the corresponding coefficients. Tamper detection is possible in localized spatial and frequency regions. Unlike previously proposed techniques, this novel approach provides information on specific frequencies of the image that have been modified. This allows the user to make application-dependent decisions concerning whether an image, which is JPEG compressed for instance, still has credibility. Analysis is provided to evaluate the performance of the technique to varying system parameters. In addition, we compare the performance of the proposed method to existing fragile watermarking techniques to demonstrate the success and potential of the method for practical multimedia tamper proofing and authentication.

554 citations

Proceedings ArticleDOI
16 Sep 1996
TL;DR: This work describes two techniques for the invisible marking of images and analyzes the robustness of the watermarks with respect to linear and nonlinear filtering, and JPEG compression.
Abstract: The growth of networked multimedia systems has magnified the need for image copyright protection. One approach used to address this problem is to add an invisible structure to an image that can be used to seal or mark it. These structures are known as digital watermarks. We describe two techniques for the invisible marking of images. We analyze the robustness of the watermarks with respect to linear and nonlinear filtering, and JPEG compression. The results show that our watermarks detect all but the most minute changes to the image.

548 citations


Network Information
Related Topics (5)
Feature extraction
111.8K papers, 2.1M citations
90% related
Wireless sensor network
142K papers, 2.4M citations
88% related
Network packet
159.7K papers, 2.2M citations
86% related
Wireless
133.4K papers, 1.9M citations
85% related
Wireless network
122.5K papers, 2.1M citations
85% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023375
2022714
2021505
2020674
2019802
2018848