2002
DOI: 10.1016/s0164-1212(01)00142-x
|View full text |Cite
|
Sign up to set email alerts
|

A public verifiable copy protection technique for still images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
55
0

Year Published

2004
2004
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 56 publications
(55 citation statements)
references
References 6 publications
0
55
0
Order By: Relevance
“…Many lossless watermarking techniques have also been proposed [10][11][12][13][14][15][16] to maintain good image quality. Visual cryptography [13][14][15] is such one kind of lossless watermarking scheme which furnishes the requirement by utilizing the codebook concept to divide an image into several different sharing images and produce the same by stacking when a dispute for ownership arises.Visual cryptography serves as a good technique against tampering of digital media and proving its rightful ownership and gained much attention for researchers in recent years.…”
Section: Related Workmentioning
confidence: 99%
“…Many lossless watermarking techniques have also been proposed [10][11][12][13][14][15][16] to maintain good image quality. Visual cryptography [13][14][15] is such one kind of lossless watermarking scheme which furnishes the requirement by utilizing the codebook concept to divide an image into several different sharing images and produce the same by stacking when a dispute for ownership arises.Visual cryptography serves as a good technique against tampering of digital media and proving its rightful ownership and gained much attention for researchers in recent years.…”
Section: Related Workmentioning
confidence: 99%
“…Step 1: The translation is eliminated by setting the center of the image , at point with and in (2). , and are the moments of , .…”
Section: Image Normalizationmentioning
confidence: 99%
“…Step 2: Apply a shearing transform to , in the x direction with matrix A= 1 β 0 1 and d=0 in (2). The parameter β is set in a way that the resulting image, denoted by , achieves 0 [11], where the superscript is used to denote , .…”
Section: Image Normalizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, how to conquer this problem is a major challenge in most of the digital watermarking techniques. Different from conventional watermarking schemes, some novel schemes combining the signature with digital watermarking-like techniques were proposed [1,[14][15][16][17]. There are four advantages in these schemes.…”
Section: Introductionmentioning
confidence: 99%