Chandra et al., 2010 - Google Patents
Digital watermarking technique for protecting digital imagesChandra et al., 2010
- Document ID
- 8448617072487369268
- Author
- Chandra M
- Pandey S
- Chaudhary R
- Publication year
- Publication venue
- 2010 3rd International Conference on Computer Science and Information Technology
External Links
Snippet
Internet evolution, along with the advancement of digital multimedia tools have create a major impact in making the storage and distribution of multimedia content a straightforward tasks. Thus security of multimedia contents becomes a vital issue and there is a need in …
- 238000000034 method 0 title abstract description 41
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dixit et al. | A review on digital image watermarking techniques | |
Bartolini et al. | Image authentication techniques for surveillance applications | |
Kaur et al. | A study of digital image watermarking | |
Chandra et al. | Digital watermarking technique for protecting digital images | |
Hadmi¹ et al. | Perceptual image hashing | |
Perwej et al. | An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection | |
Liu et al. | The survey of digital watermarking-based image authentication techniques | |
Hadmi et al. | A robust and secure perceptual hashing system based on a quantization step analysis | |
Chamlawi et al. | Wavelet based image authentication and recovery | |
Ho et al. | Image content authentication using pinned sine transform | |
Ho et al. | A semi-fragile pinned sine transform watermarking system for content authentication of satellite images | |
Mahmoud et al. | Frequency domain watermarking: An overview. | |
Samcovic et al. | Attacks on digital wavelet image watermarks | |
Mehta et al. | Digital image watermarking: A review | |
Terzija | Robust digital image watermarking algorithms for copyright protection. | |
Alturki et al. | Secure fragile digital watermarking technique for image authentication | |
Liang et al. | Ridgelet-based robust and perceptual watermarking for images | |
Pandey | Harmonizing Content Security: A Comprehensive Survey of Semi-Fragile Watermarking Techniques | |
Astridefi et al. | Audio, Text, Image, and Video Digital Watermarking Techniques for Security of Media Digital | |
Resmi | Watermarking and Image Hiding Algorithm | |
Kansal et al. | Fragile watermarking for image authentication using a hierarchical mechanism | |
Doyoddorj et al. | Design and analysis of a fragile watermarking scheme based on block-mapping | |
Tamane et al. | Digital watermarking using image fusion method | |
Shu | Orthogonal transform watermarking techniques for authentification of digital images and documents | |
Verma | Analysis of Digital Watermarking and Techniques: A Review |