Sciweavers

IWDW
2007
Springer
13 years 10 months ago
Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding
In this paper, we propose a print-scan resilient watermarking method which takes advantage of multiple watermarking. The method presented here consists of three separate watermarks...
Anu Pramila, Anja Keskinarkaus, Tapio Seppäne...
IWDW
2007
Springer
13 years 10 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
IWDW
2007
Springer
13 years 10 months ago
Dither Modulation in the Logarithmic Domain
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
Pedro Comesaña, Fernando Pérez-Gonz&...
IWDW
2007
Springer
13 years 10 months ago
Reversible Data Hiding Using Prediction Error Values Embedding
Yongjian Hu, Heung-Kyu Lee, Jianwei Li, Kaiying Ch...
IWDW
2007
Springer
13 years 10 months ago
GA-Based Robustness Evaluation Method for Digital Image Watermarking
Giulia Boato, V. Conotter, Francesco G. B. De Nata...
IWDW
2007
Springer
13 years 10 months ago
Detecting Photographic Composites of People
The compositing of two or more people into a single image is a common form of manipulation. We describe how such composites can be detected by estimating a camera’s intrinsic par...
Micah K. Johnson, Hany Farid
IWDW
2007
Springer
13 years 10 months ago
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack
Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-K...