Proceedings of the 2001 Workshop on Multimedia and Security New Challenges - MM&Sec '01 2001
DOI: 10.1145/1232454.1232458
|View full text |Cite
|
Sign up to set email alerts
|

On multiple watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
1

Year Published

2004
2004
2019
2019

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 54 publications
(34 citation statements)
references
References 6 publications
0
33
1
Order By: Relevance
“…This can be achieved by adding a watermark to the previously watermarked signal but in a different frequency band. This can be achieved by using the same mother wavelet but with Thus, multi-level watermarking can be defined as a process of embedding multiple watermarks to the same host signal, where each watermark can be detected or extracted separately and securely with corresponding keys without the knowledge of other watermarks in the host signal (Sheppard et al, 2001). Multi-level watermarking can be used to increase payload capacity and achieve different levels of robustness which offer different levels of security.…”
Section: Multi-level Watermarkingmentioning
confidence: 99%
“…This can be achieved by adding a watermark to the previously watermarked signal but in a different frequency band. This can be achieved by using the same mother wavelet but with Thus, multi-level watermarking can be defined as a process of embedding multiple watermarks to the same host signal, where each watermark can be detected or extracted separately and securely with corresponding keys without the knowledge of other watermarks in the host signal (Sheppard et al, 2001). Multi-level watermarking can be used to increase payload capacity and achieve different levels of robustness which offer different levels of security.…”
Section: Multi-level Watermarkingmentioning
confidence: 99%
“…Recently, the usage of multiple watermarks has attracted several proposals [13,14]. While in most of the cases, multiple watermarking is used in multimedia applications, it has also been used in other applications like protection in wireless sensor networks [15]. A review of the various methods used for multiple watermarking is given by [16].…”
Section: Previous Studiesmentioning
confidence: 99%
“…Apart from Sheppard et al, 5 composite and successive watermarking are hardly discussed in literature. Only Shieh et al 6 propose a successive watermarking scheme where the first mark is embedded in a vector quantization domain whereas the second watermarking schemes operates in the middle DCT frequency band.…”
Section: Multiple Watermarkingmentioning
confidence: 99%
“…Focussing on the way how single watermarking techniques are actually fused into multiple watermarking schemes, Sheppard et al 5 distinguish three main categories of multiple watermarking techniques:…”
Section: Introductionmentioning
confidence: 99%