Sciweavers

200 search results - page 17 / 40
» Digital Watermarking
Sort
View
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
MMS
2008
13 years 7 months ago
On error-correcting fingerprinting codes for use with watermarking
Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal c...
Hans Georg Schaathun
ICIP
2001
IEEE
14 years 9 months ago
Hierarchical watermarking depending on local constraints
In this paper we propose a new watermarking technique where the watermark is embedded according to two keys. The first key is used to embed a code bit in a block of pixels. The se...
Christopher D. Coltman, Adrian G. Bors
SSWMC
2004
13 years 8 months ago
The Watermark Evaluation Testbed (WET)
While Digital Watermarking has received much attention in recent years, it is still a relatively young technology. There are few accepted tools/metrics that can be used to evaluat...
Hyung Cook Kim, Hakeem Ogunleye, Oriol Guitart, Ed...
MMSEC
2004
ACM
126views Multimedia» more  MMSEC 2004»
14 years 24 days ago
Key-dependency for a wavelet-based blind watermarking algorithm
When a host image is watermarked multiple times by the same algorithm collisions can occur. This makes it difficult for an image to host multiple watermarks. But this hosting is n...
Michael Brachtl, Andreas Uhl, Werner Dietl