Sciweavers

199 search results - page 32 / 40
» Digital Watermarking - Introduction
Sort
View
JCP
2007
88views more  JCP 2007»
14 years 9 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
ICIP
2007
IEEE
15 years 11 months ago
A Composite Approach for Blind Grayscale Logo Watermarking
This paper presents a composite blind digital watermarking technique, CompMark, to hide a visually meaningful grayscale logo in a host image. The multi-resolution fusion principle...
Elliot First, Xiaojun Qi
NOSSDAV
2009
Springer
15 years 2 months ago
Secure multimedia content delivery with multiparty multilevel DRM architecture
For scalability of business, multiparty multilevel digital rights management (DRM) architecture, where a multimedia content is delivered by an owner to a consumer through several ...
Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S....
CVPR
2010
IEEE
15 years 5 months ago
Learning from Interpolated Images using Neural Networks for Digital Forensics
Interpolated images have data redundancy, and special correlation exists among neighboring pixels, which is a crucial clue in digital forensics. We design a neural network based f...
Yizhen Huang, Na Fan
AAECC
2006
Springer
74views Algorithms» more  AAECC 2006»
15 years 3 months ago
Nested Codes for Constrained Memory and for Dirty Paper
Abstract Dirty paper coding are relevant for wireless networks, multiuser channels, and digital watermarking. We show that the problem of dirty paper is essentially equivalent to s...
Hans Georg Schaathun, Gérard D. Cohen