Sciweavers

666 search results - page 26 / 134
» Fair watermarking techniques
Sort
View
83
Voted
SSWMC
2004
14 years 11 months ago
The Watermark Evaluation Testbed (WET)
While Digital Watermarking has received much attention in recent years, it is still a relatively young technology. There are few accepted tools/metrics that can be used to evaluat...
Hyung Cook Kim, Hakeem Ogunleye, Oriol Guitart, Ed...
ICIP
2004
IEEE
15 years 11 months ago
A public-key authentication watermarking for binary images
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
Hae Yong Kim, Ricardo L. de Queiroz
ICASSP
2008
IEEE
15 years 4 months ago
An invertible quantization based watermarking approach
In this paper a new class of invertible watermarking approach based on quantization has been introduced. Based on the necessary conditions (blindness, reversibility and impercepti...
Mohammad Javad Saberian, Mohammad Ali Akhaee, Faro...
MMM
2006
Springer
103views Multimedia» more  MMM 2006»
15 years 3 months ago
Multimedia and metadata watermarking driven by application constraints
Providing a fully functional multimedia DBMS (MMDBMS) becomes an emergency with the recent development of distributed environments. In this paper, we address the impact of using w...
Richard Chbeir, David Gross-Amblard
IH
1999
Springer
15 years 2 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel