Sciweavers

560 search results - page 36 / 112
» Robust Mesh Watermarking
Sort
View
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
14 years 4 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
14 years 4 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
IH
1999
Springer
14 years 2 months ago
Robust Watermarking for Images Based on Color Manipulation
Abstract. In this paper we present a new efficient watermarking scheme for images. The basic idea of our method is to alter the colors of the given image in a suitable but imperce...
Sebastiano Battiato, Dario Catalano, Giovanni Gall...
IH
1999
Springer
14 years 2 months ago
Robust Object Watermarking: Application to Code
In this paper, we focus on a step of the watermarking process whose importance has been disregarded so far. In this perspective, we introduce the vector extraction paradigm which i...
Julien P. Stern, Gaël Hachez, François...
ICIP
2005
IEEE
14 years 11 months ago
An asymmetric watermarking method for copyright protection utilizing dual bases
We present an asymmetric watermarking method for copyright protection that uses different matrix operations to embed and extract a watermark. It allows for the public release of a...
Jengnan Tzeng, Wen-Liang Hwang, I-Liang Chern