Sciweavers

Share
ICASSP
2011
IEEE
8 years 2 months ago
A new data hiding method using angle quantization index modulation in gradient domain
A robust data hiding scheme that embeds the watermark bits by quantizing the gradient directions of an image is proposed. By embedding the watermark in the angle, the watermark be...
Ehsan Nezhadarya, Z. Jane Wang, Rabab K. Ward
CORR
2011
Springer
169views Education» more  CORR 2011»
8 years 5 months ago
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images
This paper proposes a strict authentication watermarking for medical images. In this scheme, we define region of interest (ROI) by taking the smallest rectangle around an image. T...
Jasni Mohamad Zain
ICIP
2009
IEEE
8 years 8 months ago
Image quality monitoring using spread spectrum watermarking
An improved blind image quality assessment scheme that is based on the Watson's just noticeable difference (JND) modulated spread spectrum watermarking, is proposed. For the ...
Ehsan Nezhadarya, Z. Jane Wang, Rabab K. Ward
ICPR
2010
IEEE
8 years 8 months ago
Block Pyramid Based Adaptive Quantization Watermarking for Multimodal Biometric Authentication
This paper proposes a novel robust watermarking scheme to embed fingerprint minutiae into face images for multimodal biometric authentication. First, a block pyramid is layered ac...
Bin Ma, ChunLei Li, Yunhong Wang, Zhaoxiang Zhang,...
ICMCS
2010
IEEE
260views Multimedia» more  ICMCS 2010»
8 years 9 months ago
Compressed-encrypted domain JPEG2000 image watermarking
In digital rights management (DRM) systems, digital media is often distributed by multiple levels of distributors in a compressed and encrypted format. The distributors in the cha...
A. V. Subramanyam, Sabu Emmanuel, Mohan S. Kankanh...
MTA
2007
122views more  MTA 2007»
8 years 10 months ago
Geometrically invariant watermarking: synchronization through circular Hough transform
This paper addresses a geometrically invariant watermarking method for digital images. Most previous watermarking algorithms perform weakly against geometric distortions, which des...
Hae-Yeoun Lee, Choong-Hoon Lee, Heung-Kyu Lee
CORR
2010
Springer
191views Education» more  CORR 2010»
8 years 10 months ago
Dual Watermarking Scheme with Encryption
-- Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT-SVD with chaos encryption algorithm, wi...
R. Dhanalakshmi, K. Thaiyalnayaki
VLDB
2002
ACM
116views Database» more  VLDB 2002»
8 years 10 months ago
Watermarking Relational Databases
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking,...
Rakesh Agrawal, Jerry Kiernan
TIP
2002
129views more  TIP 2002»
8 years 10 months ago
A vision-based masking model for spread-spectrum image watermarking
Abstract-- We present a perceptual model for hiding a spreadspectrum watermark of variable amplitude and density in an image. The model takes into account the sensitivity and maski...
Martin Kutter, Stefan Winkler
JEI
2002
152views more  JEI 2002»
8 years 10 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
books