Southcon/96 Conference Record
DOI: 10.1109/southc.1996.535064
|View full text |Cite
|
Sign up to set email alerts
|

A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia

Abstract: We describe a digital watermarking method for use in audio, image, video and multimedia data. We argue that a watermark must be placed in perceptually significant components of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modification of these components can lead to perceptual degradation of the signai. To avoid this, we propose to insert a watermark into the spectral components of the data using techniques analogous to spread sprectrum commun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Two methods for watermarking images which are highly sensitive to noise and are easily corrupted are proposed in Schyndel et al [1994]. A promising method based on spread-spectrum which is difficult to intercept and remove but may introduces perceivable distortion into the host signal has been proposed by Cox et al [1996]. Yeung et al [1997] addressed the requirements, techniques, and applications of digital watermarking targeted for high-quality images.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Two methods for watermarking images which are highly sensitive to noise and are easily corrupted are proposed in Schyndel et al [1994]. A promising method based on spread-spectrum which is difficult to intercept and remove but may introduces perceivable distortion into the host signal has been proposed by Cox et al [1996]. Yeung et al [1997] addressed the requirements, techniques, and applications of digital watermarking targeted for high-quality images.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, in the last few years, the rapid growth in watermarking or signature-hiding techniques in numerous areas, most often in connection with the Internet, has been observed. Numerous signature-hiding techniques have been proposed for image [Bender et al 1996;Cox et al 1996;van Schyndel et al 1994], video [Hartung and Kutter 1999], voice [Boney et al 1996] and text data [Berghel and O'Gorman 1996]. However, these techniques do not provide an adequate solution for intellectual property protection.…”
Section: Introductionmentioning
confidence: 99%
“…The two main used techniques for watermark embedding are the spread spectrum (SS) [12] and the quantization (QIM) [10] based techniques. These techniques have been subject to much amelioration such as the spread transform dither modulation [13] and the progressive quantization [14] for QIM-based-techniques; and the improved SS [9], the multiplicative SS (MSS) [15], and the improved MSS for SSbased-techniques [16].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, many techniques for watermarking digital data (text, image, audio, video and multimedia) have been developed [1,3,4,10,12]. These techniques simply add a signature to the digital data and thus change the original data.…”
Section: Related Workmentioning
confidence: 99%
“…The MIS containing M is constructed in the following way: the vertex vi, where i is equal to the value of the first blog 2 A small example of an 11-node graph with the embedded message 199810 = 111110011102 is shown in Figure 4, where we color the graph with three colors fv1; v 4 If we apply the algorithm in Figure 3 on a random graph Gn;p, the first vertex can be selected arbitrarily, and its pn neighbors will be eliminated. So there will be at most 1 , pn = qnvertices qualified for the second vertex of the same MIS.…”
Section: Watermarking Technique 2 | Selecting Mismentioning
confidence: 99%