Introduction: Computer Vision Research at NECI
International Journal of Computer Vision - Special issue on computer vision research at NEC Research Institute
Journal of VLSI Signal Processing Systems - Special issue on multimedia signal processing
Embedding robust gray-level watermark in an image using discrete cosine transformation
Distributed multimedia databases
A functional taxonomy for software watermarking
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
Watermarking scheme capable of resisting attacks based on availability of inserter
Signal Processing - Image and Video Coding beyond Standards
Digital image watermarking based on discrete wavelet transform
Journal of Computer Science and Technology
Protecting Digital-Image Copyrights: A Framework
IEEE Computer Graphics and Applications
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Integration of digital rights management into the internet open trading protocol
Decision Support Systems
WAIM '02 Proceedings of the Third International Conference on Advances in Web-Age Information Management
Second Generation Benchmarking and Application Oriented Evaluation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Zero-Knowledge Watermark Detection and Proof of Ownership
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Watermarking applications and their properties
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Hiding digital watermarks using fractal compression technique
Fundamenta Informaticae
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization
Fundamenta Informaticae
An additive-attack-proof watermarking mechanism for databases' copyrights protection using image
Proceedings of the 2007 ACM symposium on Applied computing
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing
A new repeating color watermarking scheme based on human visual model
EURASIP Journal on Applied Signal Processing
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Hardware assisted watermarking for multimedia
Computers and Electrical Engineering
Robust multiplicative patchwork method for audio watermarking
IEEE Transactions on Audio, Speech, and Language Processing
Behavior forensics with side information for multimedia fingerprinting social networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A logarithmic quantization index modulation for perceptually better data hiding
IEEE Transactions on Image Processing
Multimedia Tools and Applications
IH'04 Proceedings of the 6th international conference on Information Hiding
Towards the public but noninvertible watermarking
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Watermarking spatial trajectory database
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Efficient implementation of zero-knowledge proofs for watermark detection in multimedia data
Transactions on Data Hiding and Multimedia Security I
Hiding Digital Watermarks Using Fractal Compression Technique
Fundamenta Informaticae
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization
Fundamenta Informaticae
Steal this movie - automatically bypassing DRM protection in streaming media services
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.07 |
Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for copyright control, where it is envisaged that digital video recorders will not permit the recording of content that is watermarked as “never copy”. In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to remove the watermark so that an illegal copy can be made. We discuss to what extent a watermark can be resistant to tampering and describe a variety of possible attacks