Sciweavers

666 search results - page 4 / 134
» Fair watermarking techniques
Sort
View
ICIP
2006
IEEE
14 years 9 months ago
Optimum Watermark Design by Vector Space Projections
We introduce an optimum watermark embedding technique that satisfies common watermarking requirements such as visual fidelity, sufficient embedding rate, robustness against noise ...
Oktay Altun, Gaurav Sharma, Mark F. Bocko
ICIP
2000
IEEE
14 years 9 months ago
Image Watermarking with Better Resilience
We present schemes for hardeningimage watermarks against adversarial jamming. Our techniques improve upon standard correlation- and spread spectrum-based methods, and withstand va...
Ramarathnam Venkatesan, Mariusz H. Jakubowski
KES
2005
Springer
14 years 28 days ago
Comparison of Feature Extraction Techniques for Watermark Synchronization
Abstract. This paper evaluates feature extraction techniques in aspect of watermark synchronization. Most watermarking algorithms suffer from geometric distortion attacks that desy...
Hae-Yeoun Lee, Heung-Kyu Lee, Junseok Lee
JEI
2006
113views more  JEI 2006»
13 years 7 months ago
Transparent robust information hiding for ownership verification
For copyright protection, the robustness of a watermarking scheme against various attacks is an essential requirement. Many proposed robust watermarking schemes may achieve good r...
Dan Yu, Farook Sattar, Sirajudeen Gulam Razul
PAISI
2007
Springer
14 years 1 months ago
Informed Recognition in Software Watermarking
Software watermarking is a technique to protect programs from piracy through embedding secret information into the programs. As software unauthorized use and modification are ubiq...
William Zhu