1999
DOI: 10.1117/12.344678
|View full text |Cite
|
Sign up to set email alerts
|

<title>Secure robust digital watermarking using the lapped orthogonal transform</title>

Abstract: Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyright material. One approach to '&ansform Domain image watermarking is to divide the image into separate blocks and compute the transform of each block. The watermark is inserted in the transform domain and the inverse transform is then computed. Such an approach is particularly effective against JPEG compression where 8 x 8 blocks are used in conjunction with the DCT. Using small blocks allows the waterm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2001
2001
2009
2009

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…The lapped orthogonal transformation (LOT) firstly proposed by Malvar [4] is an effective solution to this problem. Most of the current techniques for embedding watermarks in digital images are inspired by methods of LOT [5,6,7].…”
Section: Introductionmentioning
confidence: 99%
“…The lapped orthogonal transformation (LOT) firstly proposed by Malvar [4] is an effective solution to this problem. Most of the current techniques for embedding watermarks in digital images are inspired by methods of LOT [5,6,7].…”
Section: Introductionmentioning
confidence: 99%
“…See for example [2], [3] for digital images, [4], [5] for video and [8], [9] for audio signals • Copy Control or Broadcast Watermark: Ensuring copyrights with customer rights protocols, for example for copy or receipt control, see Kalker [ 12].…”
Section: Introductionmentioning
confidence: 99%
“…LOT was used in secure watermarking in Ref. 26 with the watermark embedded using a template with log-polar-mapping to combat the geometrical attacks. Our new method differs in the way the watermark is embedded using an HVS model.…”
Section: Introductionmentioning
confidence: 99%