IWDW
14 years 3 months ago
2004 Springer
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
IWDW
14 years 3 months ago
2004 Springer
This paper presents a new method for robust data hiding in curves and highlights potential applications including digital fingerprinting of map document for trace and track purpos...
IWDW
14 years 3 months ago
2004 Springer
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
IWDW
14 years 3 months ago
2004 Springer
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
IWDW
14 years 3 months ago
2004 Springer
Video transcoding technology is useful for seamless video service to guarantee quality of service (QoS). But video transcoding would distort the watermark signal embedded in the vi...
|