Sciweavers

262 search results - page 42 / 53
» DWT-DCT-SVD based watermarking
Sort
View
ICASSP
2008
IEEE
15 years 3 months ago
On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme
The steganographic security in the Cachin’s work is defined as the statistical invisibility between the host signal and its marked version. At contrary, the robustness to an at...
Sofiane Braci, Rémy Boyer, Claude Delpha
IWDW
2005
Springer
15 years 2 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
CORR
2006
Springer
120views Education» more  CORR 2006»
14 years 9 months ago
Watermarking Using Decimal Sequences
: This paper introduces the use of decimal sequences in a code division multiple access (CDMA) based watermarking system to hide information for authentication in black and white i...
Navneet Mandhani, Subhash Kak
ICIP
2002
IEEE
15 years 11 months ago
Dirty-paper trellis codes for watermarking
Informed coding is the practice of representing watermark messages with patterns that are dependent on the cover Works. This requires the use of a dirty-paper code, in which each ...
Gwenaël J. Doërr, Ingemar J. Cox, Matthe...
JCP
2007
88views more  JCP 2007»
14 years 9 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet