Sciweavers

474 search results - page 75 / 95
» Region-Based Watermarking for Images
Sort
View
CORR
2008
Springer
76views Education» more  CORR 2008»
13 years 10 months ago
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system
The Good is Blondie, a wandering gunman with a strong personal sense of honor. The Bad is Angel Eyes, a sadistic hitman who always hits his mark. The Ugly is Tuco, a Mexican bandi...
Gaëtan Le Guelvouit, Teddy Furon, Franç...
CORR
2006
Springer
120views Education» more  CORR 2006»
13 years 10 months ago
Watermarking Using Decimal Sequences
: This paper introduces the use of decimal sequences in a code division multiple access (CDMA) based watermarking system to hide information for authentication in black and white i...
Navneet Mandhani, Subhash Kak
CSIE
2009
IEEE
14 years 4 months ago
An Improved Algorithm of Digital Watermarking Based on Wavelet Transform
In this paper, a digital image watermarking technique based on Discrete Wavelet Transform (DWT) will be proposed. This scheme is designed utilizing principles deriving from the hu...
Jianhong Sun, Junsheng Li, Zhiyong Li
ICMCS
2005
IEEE
87views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Correlation-based model of color picture watermarking against random geometric distortion
Random geometric distortion is one of the most difficult kinds of image processing to survive and has been a noted problem in watermarking research. Previous methods for dealing ...
Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Sato...
TIFS
2008
152views more  TIFS 2008»
13 years 9 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...