Sciweavers

73 search results - page 8 / 15
» Robust Watermarking in the Wigner Domain
Sort
View
IH
2005
Springer
15 years 3 months ago
Dither Modulation Watermarking of Dynamic Memory Traces
We describe a dynamic software watermark embedded in the memory trace of an executing Java program. Our approach is a generalisation of the spread–transform watermarking techniqu...
Alan J. Larkin, Félix Balado, Neil J. Hurle...
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
15 years 3 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Spread-Spectrum Substitution watermarking Game
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
15 years 3 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 4 months ago
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images
This paper proposes a strict authentication watermarking for medical images. In this scheme, we define region of interest (ROI) by taking the smallest rectangle around an image. T...
Jasni Mohamad Zain