Sciweavers

384 search results - page 20 / 77
» A Survey of Watermarking Security
Sort
View
ICIP
2005
IEEE
14 years 9 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
SSWMC
2004
13 years 9 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
ICASSP
2011
IEEE
12 years 11 months ago
Informed secure watermarking using optimal transport
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
Patrick Bas
CMS
2003
101views Communications» more  CMS 2003»
13 years 9 months ago
Watermark Security via Secret Wavelet Packet Subband Structures
Abstract. Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We use the vast amount of possible wavelet packet decomposition structures to create a...
Werner Dietl, Andreas Uhl
ICASSP
2008
IEEE
14 years 2 months ago
On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme
The steganographic security in the Cachin’s work is defined as the statistical invisibility between the host signal and its marked version. At contrary, the robustness to an at...
Sofiane Braci, Rémy Boyer, Claude Delpha