Sciweavers

17 search results - page 2 / 4
» Zero-knowledge watermark detector robust to sensitivity atta...
Sort
View
87
Voted
IWDW
2007
Springer
15 years 5 months ago
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack
Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-K...
IWDW
2005
Springer
15 years 5 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
IWDW
2005
Springer
15 years 5 months ago
Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect
Image-Adaptive watermarking systems exploit visual models to adapt the watermark to local properties of the host image. This leads to a watermark power enhancement, hence an improv...
Amir Houman Sadr, Shahrokh Ghaemmaghami
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
15 years 5 months ago
A Geometrically Robust Watermarking Scheme Based on Self-Recognition Watermark Pattern
Presently, almost all of the watermarking algorithms resistant to geometric attacks are dependent on the synchronization. In this paper, a geometrically robust watermarking scheme...
Hefei Ling, Zhengding Lu, Fuhao Zou, Wugang Yuan
TIP
2002
94views more  TIP 2002»
14 years 11 months ago
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
Watermarkingwith both obliviousdetection and high robustness capabilities is still a challenging problem. The existing methods are either robust or oblivious, but it is di cult to...
Chun-Shien Lu, Hong-Yuan Mark Liao, Martin Kutter