Sciweavers

4029 search results - page 4 / 806
» Experience with Software Watermarking
Sort
View
IEEEMSP
2002
IEEE
133views Multimedia» more  IEEEMSP 2002»
14 years 2 months ago
Watermark embedding in DC components of DCT for binary images
—This paper investigates the feasibility of watermark embedding in the discrete cosine transform (DCT) domain for binary images. Watermark embedding is known difficult for binar...
Haiping Lu, Xuxia Shi, Yun Q. Shi, Alex C. Kot, Li...
ICIP
2002
IEEE
14 years 11 months ago
A comparison between an objective quality measure and the mean annoyance values of watermarked videos
In this paper, a comparison between an objective quality measure and the perceived mean annoyance values of watermarked videos is presented. A psychophysical experiment has been p...
Mylene Christine Queiroz de Farias, Marco Carli, S...
ICICIC
2006
IEEE
14 years 3 months ago
Relational Databases Watermark Technique Based on Content Characteristic
With the development of the Internet and wide applications of databases, the databases providers are worrying about their ownership of the databases. Combined with the digital wat...
Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, S...
IH
2005
Springer
14 years 3 months ago
Dither Modulation Watermarking of Dynamic Memory Traces
We describe a dynamic software watermark embedded in the memory trace of an executing Java program. Our approach is a generalisation of the spread–transform watermarking techniqu...
Alan J. Larkin, Félix Balado, Neil J. Hurle...
PCM
2001
Springer
112views Multimedia» more  PCM 2001»
14 years 2 months ago
Correlation Detection of Asymmetric Watermark
Abstract. This paper proposes a novel method to detect Furon’s asymmetric watermark by using a correlation detector that is mathematically tractable and simple. The performance o...
Jin S. Seo, Chang D. Yoo