2010 Second International Conference on Multimedia and Information Technology 2010
DOI: 10.1109/mmit.2010.102
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Robust Watermarking Technique in Wavelet Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…It provides a critical review on various available techniques. In addition, it addresses the main key performance indicators which include robustness, speed,capacity, fidelity, imperceptibility and computational complexity.Sourav Bhattacharya, T. Chattopadhyay and Arpan Pal [4] A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H.264/AVCIn this paper they perform a comparative analysis based on robustness and computational complexity ofdifferent watermarking algorithms.Video watermarking applications can be grouped as security related like Copy control, fingerprinting, ownership identification, and authentication, taper resistance etc. or value added applications like legacy system enhancement, database linking, video tagging, digital video broadcast monitoring, Media Bridge etc.…”
Section: H Early Workmentioning
confidence: 99%
“…It provides a critical review on various available techniques. In addition, it addresses the main key performance indicators which include robustness, speed,capacity, fidelity, imperceptibility and computational complexity.Sourav Bhattacharya, T. Chattopadhyay and Arpan Pal [4] A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H.264/AVCIn this paper they perform a comparative analysis based on robustness and computational complexity ofdifferent watermarking algorithms.Video watermarking applications can be grouped as security related like Copy control, fingerprinting, ownership identification, and authentication, taper resistance etc. or value added applications like legacy system enhancement, database linking, video tagging, digital video broadcast monitoring, Media Bridge etc.…”
Section: H Early Workmentioning
confidence: 99%
“…The process of decomposition is continued until the desired number of levels determined by the application is reached. Applying IDWT to LL, HL, LH, and HH, we can get four different frequency images that are low frequency image, middle-low frequency image, middle-high frequency image and high frequency image separately It is very suitable to identify the areas in the host image where a watermark can be embedded effectively due to DWT"s excellent spatio-frequency localization properties [4], [18], [22].…”
Section: Discrete Wavelet Transform (Dwt)mentioning
confidence: 99%