Vector quantization and signal compression
Vector quantization and signal compression
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Intelligent Watermarking Techniques (Innovative Intelligence)
Intelligent Watermarking Techniques (Innovative Intelligence)
Overlap and channel errors in adaptive vector quantization for image coding
Information Sciences—Informatics and Computer Science: An International Journal
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Hadamard transform based fast codeword search algorithm for high-dimensional VQ encoding
Information Sciences: an International Journal
Robust watermarking and compression for medical images based on genetic algorithms
Information Sciences: an International Journal
A multi-user based watermarking system with two-security-level keys
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Visual cryptography for digital watermarking in still images
PCM'04 Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing - Volume Part II
DCT-based image watermarking using subsampling
IEEE Transactions on Multimedia
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Multipurpose watermarking for image authentication and protection
IEEE Transactions on Image Processing
Embedding image watermarks in dc components
IEEE Transactions on Circuits and Systems for Video Technology
Audio watermarking techniques using sinusoidal patterns based on pseudorandom sequences
IEEE Transactions on Circuits and Systems for Video Technology
A multiple-level visual secret-sharing scheme without image size expansion
Information Sciences: an International Journal
New efficient and practical verifiable multi-secret sharing schemes
Information Sciences: an International Journal
The upper and lower bounds of the information-hiding capacity of digital images
Information Sciences: an International Journal
A multisecret sharing scheme for color images based on cellular automata
Information Sciences: an International Journal
Robustness-set in watermarking embedding systems using codebook classifications
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Information Sciences: an International Journal
Wavelet-based copyright-protection scheme for digital images based on local features
Information Sciences: an International Journal
A new data hiding scheme for binary image authentication with small image distortion
Information Sciences: an International Journal
Technical Communication: Authentication and recovery of images using multiple watermarks
Computers and Electrical Engineering
Rotation invariant watermark embedding based on scale-adapted characteristic regions
Information Sciences: an International Journal
Intelligent threshold selection for reversible watermarking of medical images
Proceedings of the 12th annual conference companion on Genetic and evolutionary computation
Information Sciences: an International Journal
Perceptually adaptive spread transform image watermarking scheme using Hadamard transform
Information Sciences: an International Journal
An optimal image watermarking approach based on a multi-objective genetic algorithm
Information Sciences: an International Journal
Intelligent reversible watermarking in integer wavelet domain for medical images
Journal of Systems and Software
Hi-index | 0.07 |
A new watermarking scheme having the ability of sharing secret with multi-users is proposed. It splits the original watermark into two shares and embeds one share into the cover image to increase the security. A polarization procedure is performed to establish a polarity stream from the cover image. The second share and the polarity stream are used to generate a master key and several normal keys. In this system, only the super-user can reveal the genuine watermark directly. Other users possess the normal keys can obtain shadow watermarks merely. By combining the shadow watermarks together, the real watermark can be recovered.