A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Robust optimum detection of transform domain multiplicative watermarks
2003
IEEE Transactions on Signal Processing
Although some work has been done on optimum detection of watermarks, the uncertainty of watermark signal strengths and real statistical behavior of multimedia contents have not been taken into account ...
The locally most powerful detection method is then extended to DFT domain multiplicative watermarking, with the magnitudes of coefficients modeled by the Weibull distributions. ...
More accurate performance analysis is a line of future research. Watermarks are embedded into the DFT domain by modifying a set of full-frame DFT coefficients of the image. ...
doi:10.1109/tsp.2003.809374
fatcat:kik4b42zp5btthdj4ysin52oay
Digital Watermarking Of Visual Data: State Of The Art And New Trends
2000
Zenodo
Publication in the conference proceedings of EUSIPCO, Tampere, Finland, 2000 ...
add the watermark to the coefficients of a full-frame transform (DFT, DCT, Mellin, Radon, Fresnell) of the image: these do not allow to localize precisely the watermarking disturb over the image, and ...
In [34] , De Rosa et al. derive the optimum decoder for a multiplicative/additive watermark embedded in the magnitude of DFT coefficients according to the rule y i = x i + m i x i (6) where the watermark ...
doi:10.5281/zenodo.37684
fatcat:on25dlrz4vfljhl6wcgpqfrfva
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion
[chapter]
2013
Lecture Notes in Computer Science
Besides copyright protection, digital video watermarking is also applied in non-security applications like second screen annotation, where high robustness against geometric distortions and high watermark ...
Experimental results demonstrate that the proposed scheme achieves satisfactory robustness against all kinds of attacks, including geometric distortions and frame dropping and swapping. ...
As both DCT and DFT are linear and invertible transforms, a linear relationship exists between block DCT coefficients and DFT coefficients of the full frame [13] . ...
doi:10.1007/978-3-642-40779-6_7
fatcat:bfpdmyjoabefpgaprx2xtzzzze
A Robust Frame-Based Technique For Video Watermarking
2000
Zenodo
Publication in the conference proceedings of EUSIPCO, Tampere, Finland, 2000 ...
Watermarking of Still Images The watermark casting is carried out, as described in [8] , extracting the brightness of the to-be-marked frame, computing its full-frame DFT (Discrete Fourier Transform) ...
Thanks to the good robustness the watermarking algorithm had already shown in the case of still images against usual image processing as linear/non-linear filtering, noise addition, JPEG compression, etc ...
doi:10.5281/zenodo.37644
fatcat:tymzrvgeffdhrgbl2r6ee4r2di
A M.A.P. Identification Criterion For Dct Based Watermarking
1998
Zenodo
Publication in the conference proceedings of EUSIPCO, Rhodes, Greece, 1998 ...
ACKNOWLEDGEMENTS This work was partially supported by the \Progetto Finalizzato Beni Culturali" (Finalized Project for Cultural Heritage) of the Italian National Research Council (CNR). ...
of the image full frame DCT coecients. ...
doi:10.5281/zenodo.36645
fatcat:ijcyuiqnh5glnlq3cvoyqq3mxu
Data Embedding In Speech Signals Using Perceptual Masking
2004
Zenodo
Publication in the conference proceedings of EUSIPCO, Viena, Austria, 2004 ...
The speech signal, x, is divided into non-overlapping frames of length N. The l-th frame is denoted by x l with ele- ments {x l p = x lN+p ; 0 ≤ p ≤ N − 1}. ...
Data embedding According to SCS, the transmitted signal elements are additively composed of the host signal and the watermark signal, i.e., s n = x n + w n . ...
doi:10.5281/zenodo.38653
fatcat:gqqzm7tyorfllgdkfdqo3yd34e
Copyright protection of remote sensing imagery by means of digital watermarking
2001
Sensors, Systems, and Next-Generation Satellites V
; ii discussion of a case study where the performance of two popular, state-of-the-art watermarking techniques are evaluated by the light of the requirements at the previous point. ...
On the basis of these motivations, the contribution of this work is twofold: i assessment of the requirements imposed by the characteristics of remotely sensed images on watermark-based copyright protection ...
; ii transformed domain techniques add the watermark to the coe cients of a full-frame transform DFT, DCT, Mellin, Radon, Fresnell of the image; and iii hybrid techniques mainly using block-wise DCT, and ...
doi:10.1117/12.450706
fatcat:bgxnsno72zd6roanhjhcwjmrl4
Watermarking-based protection of remote sensing images: requirements and possible solutions
2001
Mathematics of Data/Image Coding, Compression, and Encryption IV, with Applications
Along with the increase of market potential, the need arises for the protection of the image products from non-authorized use. ...
On the basis of these motivations, the contribution of this work is twofold: i assessment o f the requirements imposed by the characteristics of remotely sensed images on watermark-based copyright protection ...
; ii transformed domain techniques add the watermark to the coe cients of a full-frame transform DFT, DCT, Mellin, Radon, Fresnell of the image; and iii hybrid techniques mainly using block-wise DCT, and ...
doi:10.1117/12.449582
fatcat:izwqftji3jhvdisvohixcgfg6q
Watermark embedding: hiding a signal within a cover image
2001
IEEE Communications Magazine
the channel), and watermark retrieval (information decoding at the receiver side). ...
By focusing on the case of image watermarking, we first discuss the choice of the image features the watermark is superimposcd to. ...
Techniques operating in the full-frame frequency domain, be it the DCT or the DFT domain, tend to adopt a multiplicative embedding rule. ...
doi:10.1109/35.940048
fatcat:ovpunvldabahnhqlvzi3rvibym
Watermarking techniques for electronic delivery of remote sensing images
2002
Optical Engineering: The Journal of SPIE
As an example, the effect of watermarking on image classification is analyzed. ...
This paper studies the applicability of watermarking techniques to remote sensing imagery. ...
; (ii) transformed domain techniques add the watermark to the coefficients of a full-frame transform (DFT, DCT, Mellin, Radon, Fresnell) of the image; and (iii) hybrid techniques (mainly using block-wise ...
doi:10.1117/1.1496787
fatcat:jn2lcoo2lzf6zlrtrdo5ni6ini
Optimal adaptive diversity watermarking with channel state estimation
2001
Security and Watermarking of Multimedia Contents III
A generalized watermarking channel is considered that includes geometrical attacks, fading and additive non-Gaussian noise. ...
This work advocates the formulation of digital watermarking as a communication problem. We consider watermarking as communication with side information available for both encoder and decoder. ...
like block DCT, full-frame FFT and DCT, wavelet or Radon transforms T = I for the coordinate domain, and h :; : denotes the embedding function. ...
doi:10.1117/12.435452
dblp:conf/sswmc/VoloshynovskiyD01
fatcat:otsomo2jjffttgyckeck3bgbny
Bandwidth Extension of Telephone Speech Aided by Data Embedding
2006
EURASIP Journal on Advances in Signal Processing
A system for bandwidth extension of telephone speech, aided by data embedding, is presented. ...
600 information bits/second and with a bit error rate of approximately 3 · 10 −4 . ...
Thanks are also due to the students of the Signal and Image Processing Lab (SIPL) who volunteered to participate in the listening tests. ...
doi:10.1155/2007/64921
fatcat:22iiolfdd5fkdlhswunynewtuu
Multimedia watermarking techniques
1999
Proceedings of the IEEE
The basic concepts of watermarking systems are outlined and illustrated with proposed watermarking methods for images, video, audio, text documents, and other media. ...
Finally, a few remarks are made about the state of the art and possible future developments in watermarking technology. ...
The addition can take place in the spatial domain, or in transform domains such as the discrete Fourier transform (DFT) domain [113] , the full-image DCT domain [3] , [27] , [105] , the block-wise ...
doi:10.1109/5.771066
fatcat:e3hxw7y2s5hrdmvjrzjabognpi
Perceptual watermarks for digital images and video
1999
Security and Watermarking of Multimedia Contents
However, in order to provide transparency (invisibility of the watermark) and robustness to attack, more sophisticated use of perceptual information in the watermarking process is required. ...
In this paper, we describe digital image watermarking techniques, known as perceptually based watermarks, that are designed to exploit aspects of the human visual system. ...
ACKNOWLEDGEMENTS The authors would like to thank Professor Ahmed Tewfik, Bin Zhu, Mitchell Swanson, Mei Kobayashi and Benson Chau for providing an advanced copy of [2] , as well as example images from ...
doi:10.1117/12.344700
dblp:conf/sswmc/WolfgangPD99
fatcat:e6vabfq3pzbzzersfcxz5oeug4
Perceptual watermarks for digital images and video
1999
Proceedings of the IEEE
However, in order to provide transparency (invisibility of the watermark) and robustness to attack, more sophisticated use of perceptual information in the watermarking process is required. ...
In this paper, we describe digital image watermarking techniques, known as perceptually based watermarks, that are designed to exploit aspects of the human visual system. ...
ACKNOWLEDGEMENTS The authors would like to thank Professor Ahmed Tewfik, Bin Zhu, Mitchell Swanson, Mei Kobayashi and Benson Chau for providing an advanced copy of [2] , as well as example images from ...
doi:10.1109/5.771067
fatcat:ltzt4ch7anbzjpqot7v5hqwdli
« Previous
Showing results 1 — 15 out of 43 results