Sciweavers

113 search results - page 3 / 23
» Key Independent Watermark Detection
Sort
View
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
14 years 13 days ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen
ICIP
2002
IEEE
14 years 9 months ago
A blind watermarking technique in JPEG compressed domain
We proposed a blind watermarking technique to embed the watermark in JPEG compressed domain. Low frequency DCT coefficients are extracted to form an M-dimensional vector. Watermar...
Oscar C. Au, Peter H. W. Wong
IH
2001
Springer
13 years 12 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
VLDB
2003
ACM
156views Database» more  VLDB 2003»
14 years 7 months ago
Watermarking relational data: framework, algorithms and analysis
We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and de...
Rakesh Agrawal, Peter J. Haas, Jerry Kiernan
ICICIC
2006
IEEE
14 years 1 months ago
Relational Databases Watermark Technique Based on Content Characteristic
With the development of the Internet and wide applications of databases, the databases providers are worrying about their ownership of the databases. Combined with the digital wat...
Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, S...