Proceedings of International Conference on Image Processing
DOI: 10.1109/icip.1997.647964
|View full text |Cite
|
Sign up to set email alerts
|

DCT-based watermark recovering without resorting to the uncorrupted original image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
116
0
6

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 278 publications
(122 citation statements)
references
References 7 publications
0
116
0
6
Order By: Relevance
“…[12], a generic quantization index modulation (QIM) data hiding method [13] (with a quantization step size of 5, an embedding rate of 0.1bits per pixel (bpp)), and generic LSB. For all the data hiding methods, different random signals are embedded into different images.…”
Section: Resultsmentioning
confidence: 99%
“…[12], a generic quantization index modulation (QIM) data hiding method [13] (with a quantization step size of 5, an embedding rate of 0.1bits per pixel (bpp)), and generic LSB. For all the data hiding methods, different random signals are embedded into different images.…”
Section: Resultsmentioning
confidence: 99%
“…The embedded watermarks may be either visible [16,22] or invisible (audible or inaudible in case of audio) [6,8,9,32,28]. They cannot be removed or detected by anyone other than the creator.…”
Section: Copyright-violation Detection and Subscriber's Concernsmentioning
confidence: 99%
“…One possibility to obtain these fixed embedding positions has been proposed by Piva et al [11] and works as follows: Embed WM along a zig-zag scan of the AC coefficients similar to the walk in the JPEG compression algorithm (but on the entire N × N DCT-transformed image). Embedding of the watermark begins at a predetermined diagonal l, which becomes part of the common input.…”
Section: Solutionmentioning
confidence: 99%