Sciweavers

560 search results - page 18 / 112
» Robust Mesh Watermarking
Sort
View
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Spread-Spectrum Substitution watermarking Game
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
IWDW
2005
Springer
14 years 3 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 10 months ago
Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying...
Ming-Shing Hsieh
JEI
2006
78views more  JEI 2006»
13 years 10 months ago
Lapped-orthogonal-transform-based adaptive image watermarking
A robust, invisible watermarking scheme is proposed for digital images, where the watermark is embedded using the blockbased lapped orthogonal transform (LOT). The embedding proces...
Yuxin Liu, Bin Ni, Xiaojun Feng, Edward J. Delp
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 5 months ago
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images
This paper proposes a strict authentication watermarking for medical images. In this scheme, we define region of interest (ROI) by taking the smallest rectangle around an image. T...
Jasni Mohamad Zain