Watermarking digital image and video data. A state-of-the-art overview

GC Langelaar, I Setyawan… - IEEE Signal processing …, 2000 - ieeexplore.ieee.org
Watermarking digital image and video data. A state-of-the-art overview Page 1 20 IEEE
SIGNAL PROCESSING MAGAZINE SEPTEMBER 2000 A State-of-the-Art Overview In the past …

[PDF][PDF] A review of data hiding in digital images

ET Lin, EJ Delp - PICS, 1999 - imaging.org
In this paper we will overview the use of data hiding techniques in digital images. In
particular we will describe how one can use Steganography to hide information in a digital …

Information hiding-a survey

FAP Petitcolas, RJ Anderson… - Proceedings of the …, 2002 - ieeexplore.ieee.org
Information-hiding techniques have recently become important in a number of application
areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but …

Edge adaptive image steganography based on LSB matching revisited

W Luo, F Huang, J Huang - IEEE Transactions on information …, 2010 - ieeexplore.ieee.org
The least-significant-bit (LSB)-based approach is a popular type of steganographic
algorithms in the spatial domain. However, we find that in most existing approaches, the …

Multimedia watermarking techniques

F Hartung, M Kutter - Proceedings of the IEEE, 1999 - ieeexplore.ieee.org
Multimedia watermarking technology has evolved very quickly during the last few years. A
digital watermark is information that is imperceptibly and robustly embedded in the host data …

Spread spectrum image steganography

LM Marvel, CG Boncelet… - IEEE Transactions on …, 1999 - ieeexplore.ieee.org
We present a new method of digital steganography, entitled spread spectrum image
steganography (SSIS). Steganography, which means" covered writing" in Greek, is the …

DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure

JR Hernandez, M Amado… - IEEE transactions on …, 2000 - ieeexplore.ieee.org
A spread-spectrum-like discrete cosine transform (DCT) domain watermarking technique for
copyright protection of still digital images is analyzed. The DCT is applied in blocks of 8/spl …

Attacks on copyright marking systems

FAP Petitcolas, RJ Anderson, MG Kuhn - International workshop on …, 1998 - Springer
In the last few years, a large number of schemes have been proposed for hiding copyright
marks and other information in digital pictures, video, audio and other multimedia objects …

Robust high-capacity watermarking over online social network shared images

W Sun, J Zhou, Y Li, M Cheung… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In recent years, online social networks (OSNs) have become extremely popular and been
one of the most common ways for storing and distributing images. Naturally, such …

Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes

M Holliman, N Memon - IEEE Transactions on image …, 2000 - ieeexplore.ieee.org
We describe a class of attacks on certain block-based oblivious watermarking schemes. We
show that oblivious watermarking techniques that embed information into a host image in a …