Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video
ECMAST '97 Proceedings of the Second European Conference on Multimedia Applications, Services and Techniques
A hybrid SVD-DCT watermarking method based on LPSNR
Pattern Recognition Letters
Multimedia Watermarking Techniques and Applications (Internet and Communications Series)
Multimedia Watermarking Techniques and Applications (Internet and Communications Series)
Watermarking Polygonal Lines Using Fourier Descriptors
IEEE Computer Graphics and Applications
A new watermarking method based on DWT
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An adaptive digital image watermarking technique for copyright protection
IEEE Transactions on Consumer Electronics
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
IEEE Transactions on Image Processing
Multipurpose watermarking for image authentication and protection
IEEE Transactions on Image Processing
Circularly symmetric watermark embedding in 2-D DFT domain
IEEE Transactions on Image Processing
A vision-based masking model for spread-spectrum image watermarking
IEEE Transactions on Image Processing
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
IEEE Transactions on Image Processing
Data hiding watermarking for halftone images
IEEE Transactions on Image Processing
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This article introduces intelligent watermarking scheme to protect Web images from attackers who try to counterfeit the copyright to damage the rightful ownership. Using secret signs and logos that are embedded within the digital images, the technique can investigate technically the ownership claim. Also, the nature of each individual image is taken into consideration which gives more reliable results. The colour channel used was chosen depending on the value of its standard deviation to compromise between robustness and invisibility of the watermarks. Several types of test images, logos, attacks and evaluation metrics were used to examine the performance of the techniques used. Subjective and objective tests were used to check visually and mathematically the solidity and weakness of the used scheme.