Watermarking on compressed/uncompressed video using communications with side information mechanism
Distributed multimedia databases
Digital image watermarking for joint ownership
Proceedings of the tenth ACM international conference on Multimedia
Digital Watermarking: A Communications with Side Information Perspective
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Improvement and Comments on Image Watermarking Using Complementary Modulation
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A Visual Model for Estimating Perceptual Redundancy Inherent in Color Image
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Fragile watermarking scheme based on the block-wise dependence in the wavelet domain
Proceedings of the 2004 workshop on Multimedia and security
Jointly Verifying Ownership of an Image Using Digital Watermarking
Multimedia Tools and Applications
Digital invisible ink and its applications in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Content-adaptive digital music watermarking based on music structure analysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A novel image watermarking scheme based on amplitude attack
Pattern Recognition
Embedding color watermarks in color images
EURASIP Journal on Applied Signal Processing
A hybrid watermarking technique applied to digital images
Applied Soft Computing
Human visual system based adaptive digital image watermarking
Signal Processing
A watermarking system based on complementary quantization
SSIP'06 Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing
Dual watermark for image tamper detection and recovery
Pattern Recognition
Multiple re-watermarking using varying non-stationary mra with parameterized wavelet filters
Proceedings of the 10th ACM workshop on Multimedia and security
A light weight buyer-seller watermarking protocol
Advances in Multimedia
Visual-based embedding systems with targeted secret disclosures and applications
International Journal of Ad Hoc and Ubiquitous Computing
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Robust image watermarking using local Zernike moments
Journal of Visual Communication and Image Representation
Journal on Image and Video Processing - Special issue on distributed video coding
A robust watermarking scheme using self-reference image
Computer Standards & Interfaces
Hash-based identification of sparse image tampering
IEEE Transactions on Image Processing
A semi-blind watermarking based on discrete wavelet transform
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Nonblind and quasiblind natural preserve transform watermarking
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Multimedia Tools and Applications
Multimedia Tools and Applications
MIV'05 Proceedings of the 5th WSEAS international conference on Multimedia, internet & video technologies
A high robust blind watermarking algorithm in DCT domain
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Hi-index | 0.00 |
A novel image protection scheme called “cocktail watermarking” is proposed in this paper. We analyze and point out the inadequacy of the modulation techniques commonly used in ordinary spread spectrum watermarking methods and the visual model-based ones. To resolve the inadequacy, two watermarks which play complementary roles are simultaneously embedded into a host image. We also conduct a statistical analysis to derive the lower bound of the worst likelihood that the better watermark (out of the two) can be extracted. With this “high” lower bound, it is ensured that a “better” extracted watermark is always obtained. From extensive experiments, results indicate that our cocktail watermarking scheme is remarkably effective in resisting various attacks, including combined ones