Sciweavers

356 search results - page 63 / 72
» Foveated image watermarking
Sort
View
ICIP
2005
IEEE
14 years 11 months ago
An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking
Dirty paper trellis codes are a form of watermarking with side information. These codes have the advantage of being invariant to valumetric scaling of the cover Work. However, the...
Gwenaël J. Doërr, Ingemar J. Cox, Lin Li...
ICIP
2002
IEEE
14 years 11 months ago
Dirty-paper trellis codes for watermarking
Informed coding is the practice of representing watermark messages with patterns that are dependent on the cover Works. This requires the use of a dirty-paper code, in which each ...
Gwenaël J. Doërr, Ingemar J. Cox, Matthe...
ICIP
2001
IEEE
14 years 11 months ago
Multibit digital watermarking robust against local nonlinear geometrical distortions
This paper presents an efficient method for the estimation and recovering from nonlinear or local geometrical distortions, such as the random bending attack and restricted project...
Frédéric Deguillaume, Sviatoslav Vol...
ARCS
2006
Springer
14 years 1 months ago
Error-Correcting Codes in Steganography
: We investigate image steganography under re-encoding of images. After a secret message or a digital watermark is embedded into a jpeg image, quite frequently the image is re-enco...
Jörg Keller, Johannes Magauer
CORR
2008
Springer
76views Education» more  CORR 2008»
13 years 10 months ago
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system
The Good is Blondie, a wandering gunman with a strong personal sense of honor. The Bad is Angel Eyes, a sadistic hitman who always hits his mark. The Ugly is Tuco, a Mexican bandi...
Gaëtan Le Guelvouit, Teddy Furon, Franç...