Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data....
Ron G. van Schyndel, Andrew Z. Tirkel, Imants D. S...
—In this paper, we propose an approach to manage network resources for a direct sequence code division multiple access (DS-CDMA) visual sensor network where nodes monitor scenes ...
Elizabeth S. Bentley, Lisimachos P. Kondi, John D....
Abstract-- The emergence of digital multimedia and the proliferation of its use have raised major concerns about the protection of intellectual property. In response to these conce...
If we treated image watermarking as a communication problem using the image as the communication channel, applying error-correcting codes (ECC) to the watermarking system should i...