Sciweavers

236 search results - page 1 / 48
» From Weak to Strong Watermarking
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
13 years 11 months ago
From Weak to Strong Watermarking
The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark wit...
Nicholas Hopper, David Molnar, David Wagner
PCM
2004
Springer
190views Multimedia» more  PCM 2004»
13 years 10 months ago
Mapping Energy Video Watermarking Algorithm Based on Compressed Domain
The paper presents a novel video watermarking scheme called Mapping Energy video Watermarking (MEW) for copyright protection. The watermark is embedded in the compressed domain and...
Lijun Wang, Hongxun Yao, Shaohui Liu, Wen Gao
CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 4 months ago
A constructive and unifying framework for zero-bit watermarking
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in a piece of content. The watermark detector checks ...
Teddy Furon
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
13 years 11 months ago
Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption
Content-dependent watermarking (CDWM) has been proposed as a solution to overcome the potential estimation attack aiming to recover and remove the watermark from the host signal. ...
Zhi Li, Xinglei Zhu, Yong Lian, Qibin Sun
IH
2001
Springer
13 years 9 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu