Fractal image compression: theory and application
Fractal image compression: theory and application
Creating full view panoramic image mosaics and environment maps
Proceedings of the 24th annual conference on Computer graphics and interactive techniques
Watermarking of uncompressed and compressed video
Signal Processing
Digital watermarking
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Exploiting self-similarities to defeat digital watermarking systems: a case study on still images
Proceedings of the 2004 workshop on Multimedia and security
New intra-video collusion attack using mosaicing
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 1
How to combat block replacement attacks?
IH'05 Proceedings of the 7th international conference on Information Hiding
Blind pattern matching attack on watermarking systems
IEEE Transactions on Signal Processing
Security pitfalls of frame-by-frame approaches to video watermarking
IEEE Transactions on Signal Processing - Part II
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A new decoder for the optimum recovery of nonadditive watermarks
IEEE Transactions on Image Processing
Trifocal motion modeling for object-based video compression and manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Texture-based watermarking of 3D video objects
IEEE Transactions on Circuits and Systems for Video Technology
A Bootstrap Attack on Digital Watermarks in the Frequency Domain
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Hi-index | 0.00 |
Multimedia digital data is highly redundant: successive video frames are very similar in a movie clip, most songs contain some repetitive patterns, etc. This property can consequently be exploited to successively replace each part of the signal with a similar one taken from another location in the same signal or with a combination of similar parts. Such an approach is all the more pertinent when video content is considered since such signals exhibit both temporal and spatial self-similarities. To counter such attacking strategies, it is necessary to ensure that embedded watermarks are coherent with the redundancy of the host content. To this end, both motion-compensated watermarking and self-similarities inheritance will be surveyed.