Detection of image alterations using semifragile watermarks

ET Lin, CI Podilchuk, EJ Delp III - Security and Watermarking of …, 2000 - spiedigitallibrary.org
… the content. In this paper we describe a semi-fragile watermark for still images that can detect
… Their primary applications are copyright protection and content tracking. Robustness of the …

Multimedia content screening using a dual watermarking and fingerprinting system

D Kirovski, H Malvar, Y Yacobi - Proceedings of the tenth ACM …, 2002 - dl.acm.org
… We assume that the media player contains a watermark (WM) detector that receives a …
The primary decision is to determine the number of segments S per object. Since collusion …

[PDF][PDF] A survey of digital watermarking techniques

N Singh, M Jain, S Sharma - International Journal of Modern …, 2013 - researchgate.net
… is watermark embedding and other one is watermark detection/… Watermarking 4) Dual
Watermarking In Visible watermarking the secondary translucent overlaid into the primary content

Robust optimum detection of transform domain multiplicative watermarks

Q Cheng, TS Huang - IEEE Transactions on Signal Processing, 2003 - ieeexplore.ieee.org
… for copyright notification and protection, content authentication, transaction-tracing, …
watermarking is that it provides a way to deliver side information through primary multimedia …

From single watermark to dual watermark: a new approach for image watermarking

H Shen, B Chen - Computers & Electrical Engineering, 2012 - Elsevier
… Then, according to the content embedded we use an … a random sequence as primary
watermark and a sequence … the watermark to make detection failure in robust watermark. …

[图书][B] Techniques and applications of digital watermarking and content protection

M Arnold, M Schmucker, SD Wolthusen - 2002 - books.google.com
… While the primary focus in content protection is on aspects of copyright protection in the literal
sense, … at the watermark detector site, one can also improve the detection reliability of the …

Watermarking relational databases

R Agrawal, J Kiernan - VLDB'02: Proceedings of the 28th International …, 2002 - Elsevier
… that someone would be interested in watermarking will have a primary key. We discuss next
… an implementation in which watermark inser- tion as well as detection are implemented as …

A blind robust reversible watermark scheme for textual relational databases with virtual primary key

CC Chang, TS Nguyen, CC Lin - Digital-Forensics and Watermarking: 13th …, 2015 - Springer
… a virtual primary key by using the content of attributes. This generation is dynamic and content
… In this section, we demonstrate the details of a watermark detection procedure that can be …

[PDF][PDF] Safeguarding the digital contents: Digital watermarking

M Natarajan, G Makhdumi - DESIDOC Journal of Library & …, 2009 - researchgate.net
watermark: watermarks the data with customer identifications to track legal or illegal copies
and detect … holds the right to the primary image, it allows the primary image to be viewed, but …

[PDF][PDF] Content authentication of English text via internet using zero watermarking technique and Markov model

FM Ba-Alwi, MM Ghilan… - International Journal of …, 2014 - research.ijais.org
… A novel intelligent text zero watermarking approach based … this paper for content authentication
and tamper detection of English … • Primary matching is performed on the whole watermark