Sciweavers

356 search results - page 22 / 72
» Foveated image watermarking
Sort
View
JMM2
2008
130views more  JMM2 2008»
13 years 10 months ago
A Robust Image Watermarking Scheme using Singular Value Decomposition
This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as `l...
B. Chandra Mohan, S. Srinivas Kumar
ICIP
2002
IEEE
14 years 11 months ago
Robust bandlimited watermarking with trellis coded modulation
Digital watermarking is equivalent to bandlimited, powerlimited digital communication. The power limit is due to the requirement of imperceptible watermarks, and has long been rec...
Aria Nosratinia, Vimal Thilak
ICMCS
2008
IEEE
150views Multimedia» more  ICMCS 2008»
14 years 4 months ago
Attack by colorization of a grey-level image hiding its color palette
In this paper, we present a novel attack named colorization attack. This attack is specific to color-hiding watermarking schemes. The objective of this work is to demonstrate the...
Marc Chaumont, William Puech
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
14 years 2 months ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...
ICMCS
2005
IEEE
106views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Watermarking based Image Authentication using Feature Amplification
In a typical content and watermarking based image authentication approach, a feature is extracted from the given image, and then embedded back into the image using a watermarking ...
Shuiming Ye, Ee-Chien Chang, Qibin Sun