Watermarking digital image and video data. A state-of-the-art overview
GC Langelaar, I Setyawan… - IEEE Signal processing …, 2000 - ieeexplore.ieee.org
Watermarking digital image and video data. A state-of-the-art overview Page 1 20 IEEE
SIGNAL PROCESSING MAGAZINE SEPTEMBER 2000 A State-of-the-Art Overview In the past …
SIGNAL PROCESSING MAGAZINE SEPTEMBER 2000 A State-of-the-Art Overview In the past …
[PDF][PDF] A review of data hiding in digital images
ET Lin, EJ Delp - PICS, 1999 - imaging.org
In this paper we will overview the use of data hiding techniques in digital images. In
particular we will describe how one can use Steganography to hide information in a digital …
particular we will describe how one can use Steganography to hide information in a digital …
Information hiding-a survey
Information-hiding techniques have recently become important in a number of application
areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but …
areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but …
Edge adaptive image steganography based on LSB matching revisited
The least-significant-bit (LSB)-based approach is a popular type of steganographic
algorithms in the spatial domain. However, we find that in most existing approaches, the …
algorithms in the spatial domain. However, we find that in most existing approaches, the …
Multimedia watermarking techniques
Multimedia watermarking technology has evolved very quickly during the last few years. A
digital watermark is information that is imperceptibly and robustly embedded in the host data …
digital watermark is information that is imperceptibly and robustly embedded in the host data …
Spread spectrum image steganography
LM Marvel, CG Boncelet… - IEEE Transactions on …, 1999 - ieeexplore.ieee.org
We present a new method of digital steganography, entitled spread spectrum image
steganography (SSIS). Steganography, which means" covered writing" in Greek, is the …
steganography (SSIS). Steganography, which means" covered writing" in Greek, is the …
Attacks on copyright marking systems
In the last few years, a large number of schemes have been proposed for hiding copyright
marks and other information in digital pictures, video, audio and other multimedia objects …
marks and other information in digital pictures, video, audio and other multimedia objects …
DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure
JR Hernandez, M Amado… - IEEE transactions on …, 2000 - ieeexplore.ieee.org
A spread-spectrum-like discrete cosine transform (DCT) domain watermarking technique for
copyright protection of still digital images is analyzed. The DCT is applied in blocks of 8/spl …
copyright protection of still digital images is analyzed. The DCT is applied in blocks of 8/spl …
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
M Holliman, N Memon - IEEE Transactions on image …, 2000 - ieeexplore.ieee.org
We describe a class of attacks on certain block-based oblivious watermarking schemes. We
show that oblivious watermarking techniques that embed information into a host image in a …
show that oblivious watermarking techniques that embed information into a host image in a …
Dual watermark for image tamper detection and recovery
TY Lee, SD Lin - Pattern recognition, 2008 - Elsevier
An effective dual watermark scheme for image tamper detection and recovery is proposed in
this paper. In our algorithm, each block in the image contains watermark of other two blocks …
this paper. In our algorithm, each block in the image contains watermark of other two blocks …