Sciweavers

356 search results - page 37 / 72
» Foveated image watermarking
Sort
View
IH
2001
Springer
14 years 2 months ago
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking
Abstract. A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this n...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Thi...
ICIP
2003
IEEE
14 years 11 months ago
Spread transform watermarking for video sources
Spread Transform (ST) is a quantization watermarking algorithm in which vectors of the wavelet coefficients of a host work are quantized, using one of two dithered quantizers, to ...
John Earl, Nick G. Kingsbury
ICIP
2002
IEEE
14 years 11 months ago
Watermarking 3D models
Copyright protection of graphical objects and models is important for protecting author rights in animation, multimedia, computeraided design (CAD), virtual reality, medical imagi...
Thomas Harte, Adrian G. Bors
WISA
2004
Springer
14 years 3 months ago
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
This paper addresses the problem of content-based synchronization for robust watermarking. Synchronization is a process of extracting the location to embed and detect the signature...
Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-...
ICIP
2009
IEEE
14 years 11 months ago
Perfomance Analysis Of The Fridrich-goljan Self-embedding Authentication Method
A performance analysis of the authentication method proposed by J. Fridrich and M. Goljan is carried out. This method has the particular feature that both the embedder and the det...