2001
DOI: 10.1016/s0165-1684(01)00040-8
|View full text |Cite
|
Sign up to set email alerts
|

Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
20
0

Year Published

2004
2004
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 17 publications
0
20
0
Order By: Relevance
“…This is the major difference between 1-bit verification and multi-bit detection methods. In this latter category, Barni et al [15] introduce a multiplicative watermarking while Perez-Gonzalez et al [34] refer to additive watermarking. Recently, a heuristic multi-bit data hiding method based on the multiband wavelet transform and the empirical mode decomposition [35] is introduced in [31].…”
mentioning
confidence: 99%
“…This is the major difference between 1-bit verification and multi-bit detection methods. In this latter category, Barni et al [15] introduce a multiplicative watermarking while Perez-Gonzalez et al [34] refer to additive watermarking. Recently, a heuristic multi-bit data hiding method based on the multiband wavelet transform and the empirical mode decomposition [35] is introduced in [31].…”
mentioning
confidence: 99%
“…(21) can identify the right watermarks embedded in the images with the detection probability P D = 1. Watermarking desynchronization is one of the most effective attack against any digital watermarking scheme [1,7,8,10,15,34,35]. In the proposed watermarking scheme of Sec.…”
Section: Experimental Results Of Attacks Of Dithering and Desynchronimentioning
confidence: 99%
“…Digital image watermarking, as a tool for copyright protection of images, has attracted significant attention [1][2][3][4][5][6][7][8][9][10][11][12]. A digital watermark contains information about the copyright owner, the authorized consumer or other information needed to be embedded, while the image acts as a host to which digital watermarks are adhered to [1][2][3][4][5][6][7][8][9][10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the first class, often known as multibit watermarking, a specific data, such as ID or track number, is embedded into the host data. In this case, the embedded watermark communicates a multibit message which must be extracted accurately at the decoding side [10,11]. In the second class, it is not known whether a candidate watermark is embedded in the input data.…”
Section: Introductionmentioning
confidence: 99%