Sciweavers

666 search results - page 24 / 134
» Fair watermarking techniques
Sort
View
SIBGRAPI
2003
IEEE
15 years 3 months ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
ECR
2006
107views more  ECR 2006»
14 years 10 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
IEAAIE
2007
Springer
15 years 4 months ago
Robust Multi-scale Full-Band Image Watermarking for Copyright Protection
With the exponential growth of digital materials in this age, the protection of Intellectual Property Right (IPR) becomes an important and urgent topic. In this paper, we propose a...
Jung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo, Jen-Ch...
IH
2007
Springer
15 years 4 months ago
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation
The recent decade has seen the emergence of 3D meshes in industrial, medical and entertainment applications. Therefore, their intellectual property protection problem has attracted...
Kai Wang, Guillaume Lavoué, Florence Denis,...
CW
2004
IEEE
15 years 1 months ago
Watermarking a 3D Shape Model Defined as a Point Set
This paper discusses a method to watermark a 3D shape model defined as a set of unoriented points. Our approach is to perform frequency domain analysis of the shape of the 3D poin...
Ryutarou Ohbuchi, Akio Mukaiyama, Shigeo Takahashi