Sciweavers

560 search results - page 47 / 112
» Robust Mesh Watermarking
Sort
View
ICIP
2005
IEEE
16 years 2 months ago
Redundant-wavelet watermarking with pixel-wise masking
An algorithm is presented which implements image watermarking in the domain of an overcomplete, or redundant, wavelet transform. This algorithm expands on a previous method which ...
Kristen M. Parker, James E. Fowler
87
Voted
IH
2009
Springer
15 years 7 months ago
Forensic Tracking Watermarking against In-theater Piracy
Many illegal copies of digital movies by camcorder capture are found on the Internet or on the black market before their official release. Due to the angle of the camcorder relativ...
Min-Jeong Lee, Kyung-Su Kim, Heung-Kyu Lee
80
Voted
MM
2000
ACM
112views Multimedia» more  MM 2000»
15 years 4 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
78
Voted
CIS
2006
Springer
15 years 4 months ago
An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection
In this paper, we propose an efficient watermarking technique using adaptive differential energy watermarking (ADEW) and cross binding wavelet tree (CBWT) for copyright protection....
Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko
SSWMC
2004
15 years 1 months ago
Image watermarking based on scale-space representation
This paper proposes a novel method for content-based watermarking based on feature points of an image. At each feature point, watermark is embedded after affine normalization acco...
Jin S. Seo, Chang D. Yoo