While Digital Watermarking has received much attention in recent years, it is still a relatively young technology. There are few accepted tools/metrics that can be used to evaluat...
Hyung Cook Kim, Hakeem Ogunleye, Oriol Guitart, Ed...
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
In this paper a new class of invertible watermarking approach based on quantization has been introduced. Based on the necessary conditions (blindness, reversibility and impercepti...
Mohammad Javad Saberian, Mohammad Ali Akhaee, Faro...
Providing a fully functional multimedia DBMS (MMDBMS) becomes an emergency with the recent development of distributed environments. In this paper, we address the impact of using w...
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...