2011
DOI: 10.2478/v10175-011-0004-3
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking software in practical applications

Abstract: Abstract. In the recent years, several digital watermarking applications have been developed for copyright protection of digital images.In this article we have tested how they perform in practical applications. We have identified the most common operations performed by professional photographers and web developers, and tested the robustness of watermarks embedded using the applications for copyright watermarking. Our aim was to prove that commercially available software does not meet the requirements of photog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 10 publications
(11 reference statements)
0
7
0
Order By: Relevance
“…In order to extract the watermark each attacked image is transformed by the means of corresponding transform. Last, the separability coefficient is computed for each transformed image from (6). Separability coefficients for Lena image at fidelity 35dB are presented in Table 1.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to extract the watermark each attacked image is transformed by the means of corresponding transform. Last, the separability coefficient is computed for each transformed image from (6). Separability coefficients for Lena image at fidelity 35dB are presented in Table 1.…”
Section: Resultsmentioning
confidence: 99%
“…After the embedding process the watermarked data is usually attacked (otherwise there is no point in carrying out experiments) [2]. In this article we focus on image processing attack such as: white noise, resize, median filtering, low-pass filtering, Gaussian noise, jpeg compression, color depth reduction which are commonly used by photographers and web developers, see [6].…”
Section: Digital Watermarking Scheme In Transform Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…The system of some connected functors creates the logical signal node [5][6]. The node signals are included in the system.…”
Section: The Signals Equivalence For Functor Traffic Node or Railway mentioning
confidence: 99%
“…In this paper, a watermarking-based approach is designed for authentication of biometric data [1,2], i.e., to assure that the data was generated by a certified sensor. Fig.…”
mentioning
confidence: 99%