2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003) (Cat. No.03CH37490)
DOI: 10.1109/pacrim.2003.1235952
|View full text |Cite
|
Sign up to set email alerts
|

A scheme of oblivious ghost-watermarking based on cepstral analysis and correlation techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The decoder functions based on 2D cepstrum dependences and the dependences occurring between 2D coefficients of the cosine transform. The beginning of the cepstrum analysis is marked for the 60's [2]; analyzing the field of digital image watermarking we find a small number of examples of using the Cepstrum [23,53,57] (used mainly for processing audio signals [37,49]). …”
Section: Introductionmentioning
confidence: 99%
“…The decoder functions based on 2D cepstrum dependences and the dependences occurring between 2D coefficients of the cosine transform. The beginning of the cepstrum analysis is marked for the 60's [2]; analyzing the field of digital image watermarking we find a small number of examples of using the Cepstrum [23,53,57] (used mainly for processing audio signals [37,49]). …”
Section: Introductionmentioning
confidence: 99%
“…[7]. In the literature there are a few examples [8], [9], [10] of using the cepstral analysis to process images (used mainly to process audio signals [11], [12]). …”
Section: Introductionmentioning
confidence: 99%