IEEE Spectrum
Cryptography: Theory and Practice
Cryptography: Theory and Practice
IEEE Journal on Selected Areas in Communications
Some general methods for tampering with watermarks
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Digital image watermarking for joint ownership
Proceedings of the tenth ACM international conference on Multimedia
An Optimized Spatial Data Hiding Scheme Combined with Convolutional Codes and Hilbert Scan
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Wavelet packets-based digital watermarking for image verification and authentication
Signal Processing - Special section: Security of data hiding technologies
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Jointly Verifying Ownership of an Image Using Digital Watermarking
Multimedia Tools and Applications
Security and rights management in digital cinema
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
Journal of Integrated Design & Process Science
EURASIP Journal on Applied Signal Processing
Video waterscrambling: towards a video protection scheme based on the disturbance of motion vectors
EURASIP Journal on Applied Signal Processing
An integrated on-line audio watermark decoding scheme for broadcast monitoring
Multimedia Tools and Applications
A Study on Digital Media Security by Hopfield Neural Network
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III
On the security of a copyright protection scheme based on visual cryptography
Computer Standards & Interfaces
Robust audio watermarking using improved TS echo hiding
Digital Signal Processing
A semi-blind digital watermarking scheme based on singular value decomposition
Computer Standards & Interfaces
Secret communication via image hiding in image by pixel value differencing
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Perceptual image hashing based on virtual watermark detection
IEEE Transactions on Image Processing
A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
FPGA based audio watermarking-Covert communication
Microelectronics Journal
Multimedia robust watermarking: commercial application and standardisation approaches
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Enhanced watermarking scheme based on texture analysis
ACIVS'06 Proceedings of the 8th international conference on Advanced Concepts For Intelligent Vision Systems
Noise-Robust watermarking for numerical datasets
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
Intellectual property rights management using combination encryption in MPEG-4
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
An improved algorithm to watermark numeric relational data
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Advanced partial encryption using watermarking and scrambling in MP3
Multimedia Tools and Applications
Visible watermarking images in high quality of data hiding
The Journal of Supercomputing
Hi-index | 0.00 |
We describe a number of applications of digital watermarking and examine the common properties of robust-ness; tamper resistance, fidelity, computational cost and false positive rate. We observe that these properties vary greatly depending on the application. Consequently, we conclude that evaluation of a watermarking algorithm is difficult without first indicating the context in which it is to be applied.