Digital watermarking

M Barni, S Katzenbeisser - Handbook of Financial Cryptography …, 2010 - taylorfrancis.com
… When the same bit is embedded in r host features, watermark embedding may still be … most
common approach to adapt the watermark signal to the local host content. Such an approach …

Attacking visible watermarking schemes

CH Huang, JL Wu - IEEE transactions on multimedia, 2004 - ieeexplore.ieee.org
… patterns are preserved and could be differentiated from host contents. If the contour of an
embedded visible watermark is completely removed or greatly distorted without introducing …

Informed histogram-based watermarking

G Hua, Y Xiang, LY Zhang - IEEE Signal Processing Letters, 2020 - ieeexplore.ieee.org
… energy-significant regions of the host signal. We show that the embedded ternary watermark
signal is more likely to be masked by the strong host signal component, thus improving …

Watermark embedding and detection

J Zhong - arXiv preprint arXiv:0706.0427, 2007 - arxiv.org
… They differ in how the watermarks are embedded into the host contents. SS schemes simply
watermark into the host contents, whereas quantization techniques watermark the host

Lookup-table-based secure client-side embedding for spread-spectrum watermarks

MU Celik, AN Lemma, S Katzenbeisser… - IEEE Transactions …, 2008 - ieeexplore.ieee.org
… , it is preferable to embed the watermark at the client. Embedding in … do not leak unmarked
content or the watermarking secrets. In … interference from the host content and the watermark’s …

Double-sided watermark embedding and detection

J Zhong, S Huang - IEEE transactions on information forensics …, 2007 - ieeexplore.ieee.org
… quality of the watermarked contents. Our … watermarks are embedded into the host contents.
SS schemes simply add an additive or a multiplicative watermark into the host contents

Secure and robust host-adapted color image watermarking using inter-layered wavelet-packets

HM Al-Otum - Journal of Visual Communication and Image …, 2020 - Elsevier
… Digital watermarking represents a promising tool for copyright protection, content … , whereby
a particular data (watermark) is embedded into the image (host) in order to protect it against …

A novel triple recovery information embedding approach for self-embedded digital image watermarking

E Gul, S Ozturk - Multimedia Tools and applications, 2020 - Springer
… paper presents a novel self-embedded fragile watermarking method with triple recovery
information embedding approach. In this proposed method host image is divided into sixteen …

Quality scalability aware watermarking for visual content

D Bhowmik, C Abhayaratne - IEEE Transactions on Image …, 2016 - ieeexplore.ieee.org
watermarking that ensures more robust watermark extraction at various compression ratios
while not effecting the visual quality of hostwatermark embedding where more embedded

Watermark embedding: Hiding a signal within a cover image

M Barni, CI Podilchuk, F Bartolini… - IEEE Communications …, 2001 - ieeexplore.ieee.org
… , ie the watermark, within the to-beprotected data (host or cover document). Generally, the
embedded watermark must … the host features, and its implication on watermark robustncss and …