This paper presents a new method for robust data hiding in curves and highlights potential applications including digital fingerprinting of map document for trace and track purpos...
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
Abstract. Watermarking systems can employ either informed detection, where the original cover work is required, or blind detection, where it is not required. While early systems us...
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Video transcoding technology is useful for seamless video service to guarantee quality of service (QoS). But video transcoding would distort the watermark signal embedded in the vi...