Sciweavers

384 search results - page 14 / 77
» A Survey of Watermarking Security
Sort
View
JMM2
2008
130views more  JMM2 2008»
13 years 7 months ago
A Robust Image Watermarking Scheme using Singular Value Decomposition
This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as `l...
B. Chandra Mohan, S. Srinivas Kumar
CEC
2005
IEEE
13 years 9 months ago
Nonlinear mapping using particle swarm optimisation
Abstract— Nonlinear mapping is an approach of multidimensional scaling where a high-dimensional space is transformed into a lower-dimensional space such that the topological char...
Auralia I. Edwards, Andries Petrus Engelbrecht, Ne...
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
DRM
2004
Springer
14 years 27 days ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
WISA
2004
Springer
14 years 25 days ago
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
This paper addresses the problem of content-based synchronization for robust watermarking. Synchronization is a process of extracting the location to embed and detect the signature...
Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-...