TENCON 2009 - 2009 IEEE Region 10 Conference 2009
DOI: 10.1109/tencon.2009.5395812
|View full text |Cite
|
Sign up to set email alerts
|

An effective blind watermarking scheme for protecting rightful ownership of digital images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…The pattern applies a self-adjusted shading segment picking methodology; Pre-forms the watermark by Logistic riotous encryption. Dorairangaswamy, et al (2009) [6] has clarified an imperceptible and visually impaired watermarking plan for copyright security of computerized pictures with the objective of protecting against advanced robbery. In this watermarking plan, a double watermark picture has been imperceptibly installed into the host picture for accomplishing copyright assurance.…”
Section: Histogram Attackmentioning
confidence: 99%
“…The pattern applies a self-adjusted shading segment picking methodology; Pre-forms the watermark by Logistic riotous encryption. Dorairangaswamy, et al (2009) [6] has clarified an imperceptible and visually impaired watermarking plan for copyright security of computerized pictures with the objective of protecting against advanced robbery. In this watermarking plan, a double watermark picture has been imperceptibly installed into the host picture for accomplishing copyright assurance.…”
Section: Histogram Attackmentioning
confidence: 99%
“…They are known in the form of DRM which may be characterized as a system aimed at protecting digital data of high value, controlling their distribution and use [11]. The basic requirements set for the DRM system contain suitable protection of digital data against unauthorized access, suitable robustness for different types of multimedia (video, music, text, pictures), independent from the platform on which they will be used (PC, phones, TV, radio).…”
Section: Introductionmentioning
confidence: 99%
“…The basic requirements set for the DRM system contain suitable protection of digital data against unauthorized access, suitable robustness for different types of multimedia (video, music, text, pictures), independent from the platform on which they will be used (PC, phones, TV, radio). DRM consists of two components: (1) a technology of the following type: digital watermarking, encoding, copy control, authentications, tamper-resistant hardware and software, integrity checking, revocation and risk management architectures, key management, fingerprinting (2) creating technologies which allow for the use of DRM on hardware platforms [11,22].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations