1999
DOI: 10.1109/5.771069
|View full text |Cite
|
Sign up to set email alerts
|

Statistical analysis of watermarking schemes for copyright protection of images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
82
0
9

Year Published

2001
2001
2006
2006

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 144 publications
(91 citation statements)
references
References 43 publications
0
82
0
9
Order By: Relevance
“…Therefore, the computation of C ∆i at the beginning of the detection protocol described in Section 3.4 has to be extended by an additional multiplication subproof and a proof that Ŵ [m] i −1 was computed correctly. 4 Clearly, the entire detection protocol can be extended by the described subproofs, but this introduces additional overhead. Hence, embedding the watermark with Equation (1) yields a more efficient zero-knowledge watermark detection protocol.…”
Section: Equation 2: In This Case ∆ I Is Obtained As the Quotientmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the computation of C ∆i at the beginning of the detection protocol described in Section 3.4 has to be extended by an additional multiplication subproof and a proof that Ŵ [m] i −1 was computed correctly. 4 Clearly, the entire detection protocol can be extended by the described subproofs, but this introduces additional overhead. Hence, embedding the watermark with Equation (1) yields a more efficient zero-knowledge watermark detection protocol.…”
Section: Equation 2: In This Case ∆ I Is Obtained As the Quotientmentioning
confidence: 99%
“…This also includes more advanced embedding and detection strategies to improve robustness and imperceptibility with respect to the HVS as cited in [4]. We have chosen the scheme of Cox et al [3], because it is a widely known example of correlation-based watermark detection and convenient to demonstrate the practical feasibility of strong zero-knowledge watermark detection.…”
Section: Introductionmentioning
confidence: 99%
“…To succeed, an attacker has to devise some forged content (arbitrarily distinct from the watermarked one) keeping the watermark detectable. These requirements, which are exactly opposed to the robust watermarking ones, refer to the fragile watermarking problems class 1 . Nevertheless, fragile watermarking has been seldom addressed in a gametheoretic point of view [4].…”
Section: Introductionmentioning
confidence: 99%
“…one-bit watermarking) addresses the problem to determine whether a tested content contains a given watermark (hypothesis H1) or not (hypothesis H0). Regardless to the embedding techniques and detection strategies, this problem has been initially introduced to address copyright protection issues [1]. In this context, the presence of a signature conveys commercial rights information about the tested content.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, more theoretical approaches have attempted to provide watermarking, and the larger field of information hiding, with a stronger foundation [44,16,27,47,10,33,51,31,34,8,48]. Of particular note, Moulin and O'Sullivan [34] have introduced a powerful information-theoretic framework for studying watermarking.…”
Section: Introductionmentioning
confidence: 99%