Sciweavers

33 search results - page 5 / 7
» Correlation Detection of Asymmetric Watermark
Sort
View
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
14 years 27 days ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
IH
2001
Springer
13 years 11 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar
IH
2004
Springer
14 years 9 days ago
Statistical Tools for Digital Forensics
A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longe...
Alin C. Popescu, Hany Farid
ICIP
2000
IEEE
14 years 8 months ago
A New Spread Spectrum Watermarking Method with Self-Synchronization Capabilities
Among the many techniques available for informationconcealment, those based on spread spectrummodulationshave proven to yield improved results when robustness against attack is at...
Angel Navia-Vázquez, I. Mora-Jiménez
ICIP
2005
IEEE
14 years 8 months ago
An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking
Dirty paper trellis codes are a form of watermarking with side information. These codes have the advantage of being invariant to valumetric scaling of the cover Work. However, the...
Gwenaël J. Doërr, Ingemar J. Cox, Lin Li...