Sciweavers

356 search results - page 2 / 72
» Foveated image watermarking
Sort
View
109
Voted
ICIP
2001
IEEE
16 years 2 months ago
Multi-level watermarking with independent decoding
A drawback of most watermarking techniques is the need for some additional information in order to retrieve the watermark. Additionally, the robustness of the watermark decreases ...
Moshe Butman, Hagit Zabrodsky Hel-Or
96
Voted
ISCAS
2002
IEEE
190views Hardware» more  ISCAS 2002»
15 years 5 months ago
Analysis and improvement of correlation-based watermarking methods for digital images
This paper aims to design robust correlation-based watermarking methods for images. We rst present a model of watermark embedding and extracting processes and carry out their ana...
Akio Miyazaki, Akihiro Okamoto
113
Voted
ICIP
2009
IEEE
14 years 10 months ago
A compressive-sensing based watermarking scheme for sparse image tampering identification
In this paper we describe a robust watermarking scheme for image tampering identification and localization. A compact representation of the image is first produced by assembling a...
Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tu...
134
Voted
CORR
2010
Springer
191views Education» more  CORR 2010»
15 years 7 hour ago
Dual Watermarking Scheme with Encryption
-- Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT-SVD with chaos encryption algorithm, wi...
R. Dhanalakshmi, K. Thaiyalnayaki
90
Voted
ICIP
2009
IEEE
14 years 10 months ago
Spatial self-synchronizing video watermarking technique
There are various traditional video watermarking schemes robust to geometrical transformations. Most of them use synchronizing techniques or invariant transforms to resist geometr...
Tae-Woo Oh, Min-Jeong Lee, Kyung-Su Kim, Young-Suk...