A course in number theory and cryptography
A course in number theory and cryptography
Fundamentals of digital image processing
Fundamentals of digital image processing
CDMA: principles of spread spectrum communication
CDMA: principles of spread spectrum communication
IBM Systems Journal
Communications of the ACM
Digital Image Processing
Information Theory and Reliable Communication
Information Theory and Reliable Communication
Proceedings of the First International Workshop on Information Hiding
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
Adaptive Visible Watermarking of Images
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Multiresolution watermarking for images and video
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
A number of researchers have proposed using digital marks to provide ownership (watermarking) identification for the property. One way of data hiding is digital signature, copyright label or digital watermark that completely characterizes the person who applies it and, therefore, marks it as being his property. Digital Watermarking is the process that embeds data called a watermark into an object such that watermark can be detected and extracted later to make an assertion about the object. Watermarking is either "visible" or "invisible". Although visible and invisible are visual terms watermarking is not limited to images, it can also be used to protect other types of multimedia object. Our research work is on watermarking techniques in particular.Many of these proposed techniques share three specific weaknesses: complexity of copy detection, vulnerability to mark removal after revelation for ownership verification, and mark integrity issues due to partial mark removal. This paper presents a method for watermarking Handwritten Signature that achieves robustness by responding to these three weaknesses. The key techniques involve using secure functions to generate and embed image marks that is more detectable, verifiable, and secure than existing protection and detection techniques.