A dual watermarking technique for images
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 2)
Copyright protection on the web: a hybrid digital video watermarking scheme
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
A Novel Watermarking Extraction Based on Error Correcting Code and Evidence Theory
ICNC '08 Proceedings of the 2008 Fourth International Conference on Natural Computation - Volume 02
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Tamper Detection and Self-Recovery of Image Based on Self-Embedding
APCIP '09 Proceedings of the 2009 Asia-Pacific Conference on Information Processing - Volume 02
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
HIS '09 Proceedings of the 2009 Ninth International Conference on Hybrid Intelligent Systems - Volume 01
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Digital image authentication based on error-correction codes
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hi-index | 0.00 |
Recent advances in digital technologies have made alteration of digital multimedia content simple and unnoticeable by human beings. Although digital multimedia content offers numerous advantages such as easy to store, easy to transmit, etc., it has made illegal replication/distribution of digital content easier and highlights the need for digital rights management (DRM). Digital watermarking has emerged as a solution for the copyright protection of digital multimedia content. Digital watermarking hides the owner's information inside the digital multimedia content which can be extracted in future to prove the owner's copyright over the content. In this paper, self-recoverable digital watermarking method is presented to protect the digital images from tampering attacks. Experimental results show that the proposed method is robust against attacks such as cropping, blurring, noising, etc.