Sciweavers

37 search results - page 3 / 8
» Watermarking Using Decimal Sequences
Sort
View
ICIP
2001
IEEE
14 years 9 months ago
Hierarchical watermarking depending on local constraints
In this paper we propose a new watermarking technique where the watermark is embedded according to two keys. The first key is used to embed a code bit in a block of pixels. The se...
Christopher D. Coltman, Adrian G. Bors
KES
2005
Springer
14 years 1 months ago
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
Xinpeng Zhang, Shuozhong Wang
ICDIM
2007
IEEE
14 years 1 months ago
An access control video watermarking method that is robust to geometric distortions
: A new video watermarking algorithm for access control is introduced. This method is content-dependent and uses the dual tree complex wavelet transform (DT CWT) to create a waterm...
Lino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreid...
INFORMATICALT
2008
93views more  INFORMATICALT 2008»
13 years 7 months ago
Robust Watermarking based on Subsampling and Nonnegative Matrix Factorization
Abstract. This paper presents a novel robust digital image watermarking scheme using subsampling and nonnegative matrix factorization. Firstly, subsampling is used to construct a s...
Wei Lu, Hongtao Lu
IH
2001
Springer
13 years 12 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar