Wavelet packets-based digital watermarking for image verification and authentication
Signal Processing - Special section: Security of data hiding technologies
Information hiding based on search-order coding for VQ indices
Pattern Recognition Letters
Improved bit rate control for real-time MPEG watermarking
EURASIP Journal on Applied Signal Processing
Wavelet-based robust digital watermarking considering human visual system
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
Data hiding based on compressed VQ indices of images
Computer Standards & Interfaces
A Desynchronization Resilient Watermarking Scheme
Transactions on Data Hiding and Multimedia Security IV
Robust multiplicative patchwork method for audio watermarking
IEEE Transactions on Audio, Speech, and Language Processing
Robust multiplicative patchwork method for audio watermarking
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Digital watermarking of spectral images with three-dimensional wavelet transform
SCIA'03 Proceedings of the 13th Scandinavian conference on Image analysis
CAD drawing watermarking scheme
Digital Signal Processing
Robust multiplicative audio and speech watermarking using statistical modeling
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
An object-based non-blind watermarking that is robust to non-linear geometrical distortion attacks
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
A logarithmic quantization index modulation for perceptually better data hiding
IEEE Transactions on Image Processing
Hi-index | 0.25 |
When looked at as a communication task, the watermarking process can be split into three main steps: watermark generation and embedding (information transmission), possible attacks (transmission through the channel), and watermark retrieval (information decoding at the receiver side). We review the main issues in watermark generation and embedding. By focusing on the case of image watermarking, we first discuss the choice of the image features the watermark is superimposed to. Then we consider watermark generation and the rule used to insert the watermark within the host features. By adopting again a communication perspective, some useful hints are given on the way the watermark should be shaped and inserted within the host document for increased robustness against attacks. Given that invisibility is one of the main requirements a watermark must satisfy, the way psycho-visual notions can be used to effectively hide the watermark within an image is carefully reviewed. Rather than insisting on the mathematical aspects of each of the above issues, the main rationale behind the most commonly adopted approaches is given, as well as some illustrative examples