Embedding robust gray-level watermark in an image using discrete cosine transformation
Distributed multimedia databases
A public verifiable copy protection technique for still images
Journal of Systems and Software
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization
Fundamenta Informaticae
A watermarking system based on complementary quantization
SSIP'06 Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing
A semi-blind digital watermarking scheme based on singular value decomposition
Computer Standards & Interfaces
Digital watermarking for volume data based on 3D-DWT and 3D-DCT
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Watermarking algorithm with post-compression capability for digital video surveillance
SIP '07 Proceedings of the Ninth IASTED International Conference on Signal and Image Processing
Secure semi-blind watermarking based on iteration mapping and image features
Pattern Recognition
Multiple watermarking for copyright protection using DWT and dual-tree CWT
International Journal of Intelligent Engineering Informatics
DWT-Based image watermarking for copyright protection
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization
Fundamenta Informaticae
Hi-index | 0.43 |
Digital watermarking has been presented in the literature as a technique to protect the copyright of multimedia data. But most of these literature concentrates on algorithms of embedding one-dimensional watermarks or two-dimensional binary digital watermarks. In this paper, a method of embedding a gray-level digital watermark into an image is proposed. By the stack filter threshold decomposition technique, a gray-level digital watermark is decompounded into a series of binary digital images for implementing multiple watermarking. The experimental results show that the proposed techniques are tolerant to reasonable image processing operations and the lossy compression techniques such as Joint Photographic Experts Group (JPEG)