Sciweavers

211 search results - page 26 / 43
» Robustness and Security of Digital Watermarks
Sort
View
ETRICS
2006
15 years 1 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
GECCO
2005
Springer
156views Optimization» more  GECCO 2005»
15 years 3 months ago
Introducing a watermarking with a multi-objective genetic algorithm
We propose an evolutionary algorithm for the enhancement of digital semi-fragile watermaking based on the manipulation of the image discrete cosine transform (DCT). The algorithm ...
Diego Sal Díaz, Manuel Grana Romay
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
15 years 3 months ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu
IH
2009
Springer
15 years 4 months ago
Forensic Tracking Watermarking against In-theater Piracy
Many illegal copies of digital movies by camcorder capture are found on the Internet or on the black market before their official release. Due to the angle of the camcorder relativ...
Min-Jeong Lee, Kyung-Su Kim, Heung-Kyu Lee
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott