2016
DOI: 10.1007/s11042-016-3601-1
|View full text |Cite
|
Sign up to set email alerts
|

Blind image counterwatermarking – hidden data filter

Abstract: Watermarking is a dynamically developing method of copyright protection used for media (sounds, images, films, or 3D objects) that employs signal processing in order to hide additional, invisible information about the owner or author. However, studies until now have not widely considered the problem of attempting to blind removal of hidden data in a manner that allows the watermarked signal to be returned to the original signal. Current considerations of authors of leading articles in the watemarking field foc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
1
0
Order By: Relevance
“…In the literature, there are many publications on embedding a watermark in a static image using the classical methods [ 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 ]. These methods use the whole image or some of its regions, constituting the areas of interest.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the literature, there are many publications on embedding a watermark in a static image using the classical methods [ 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 ]. These methods use the whole image or some of its regions, constituting the areas of interest.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The two-factor login method described in this article using a voice biometrics system is implemented in the novel PicWATermark system for user verification and authentication. This is implemented, among other things, by means of voice biometrics but also by means of a marking method using a watermark as an identifier contained in the digital material [1,2]. In addition, the module will have in-built copyright protection mechanisms for the creators of the digital material, e.g., to identify the digital images taken.…”
Section: Introductionmentioning
confidence: 99%