Sciweavers

113 search results - page 3 / 23
» Key Independent Watermark Detection
Sort
View
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
15 years 2 months ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen
ICIP
2002
IEEE
15 years 11 months ago
A blind watermarking technique in JPEG compressed domain
We proposed a blind watermarking technique to embed the watermark in JPEG compressed domain. Low frequency DCT coefficients are extracted to form an M-dimensional vector. Watermar...
Oscar C. Au, Peter H. W. Wong
81
Voted
IH
2001
Springer
15 years 1 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
VLDB
2003
ACM
156views Database» more  VLDB 2003»
15 years 9 months ago
Watermarking relational data: framework, algorithms and analysis
We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and de...
Rakesh Agrawal, Peter J. Haas, Jerry Kiernan
93
Voted
ICICIC
2006
IEEE
15 years 3 months ago
Relational Databases Watermark Technique Based on Content Characteristic
With the development of the Internet and wide applications of databases, the databases providers are worrying about their ownership of the databases. Combined with the digital wat...
Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, S...