Sciweavers

356 search results - page 60 / 72
» Foveated image watermarking
Sort
View
ICIP
2004
IEEE
14 years 11 months ago
Estimation of attacker's scale and noise variance for qim-dc watermark embedding
Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore, the scaling factor needs to be estimated at the decoder side, such that the received (attac...
Reginald L. Lagendijk, Ivo D. Shterev
ICIP
2009
IEEE
14 years 11 months ago
Fuzzy Perceptual Watermarking For Ownership Verification
- An adaptive watermarking method based on the human visual system model and the fuzzy inference system in wavelet domain is proposed. Fuzzy logic is used for data fusion and build...
Frederick C. Harris Jr., Mukesh Motwani
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 3 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ICIP
2006
IEEE
14 years 11 months ago
A Model for the Electronic Representation of Bank Checks
The substitution of physical bank check exchange by electronic check image transfer brings agility, security and cost reduction to the clearing system. In this paper, we propose a...
Danilo Dias, Ricardo L. de Queiroz
ICIP
2000
IEEE
14 years 11 months ago
A New Spread Spectrum Watermarking Method with Self-Synchronization Capabilities
Among the many techniques available for informationconcealment, those based on spread spectrummodulationshave proven to yield improved results when robustness against attack is at...
Angel Navia-Vázquez, I. Mora-Jiménez