[PDF][PDF] Digital watermarking: A tutorial review

SP Mohanty - URL: http://www. csee. usf. edu/~ smohanty/research …, 1999 - Citeseer
The growth of high speed computer networks and that of Internet, in particular, has explored
means of new business, scientific, entertainment, and social opportunities. Ironically, the …

A review of watermarking principles and practices 1

IJ Cox, ML Miller, JPMG Linnartz… - Digital signal processing …, 2018 - taylorfrancis.com
Digital representation of copyrighted material such as movies, songs, and photographs offer
many advantages. However, the fact that an unlimited number of perfect copies can be …

[图书][B] Digital watermarking and steganography

I Cox, M Miller, J Bloom, J Fridrich, T Kalker - 2007 - books.google.com
Digital audio, video, images, and documents are flying through cyberspace to their
respective owners. Unfortunately, along the way, individuals may choose to intervene and …

Quantization index modulation: A class of provably good methods for digital watermarking and information embedding

B Chen, GW Wornell - IEEE Transactions on Information theory, 2001 - ieeexplore.ieee.org
We consider the problem of embedding one signal (eg, a digital watermark), within another"
host" signal to form a third," composite" signal. The embedding is designed to achieve …

Multimedia watermarking techniques

F Hartung, M Kutter - Proceedings of the IEEE, 1999 - ieeexplore.ieee.org
Multimedia watermarking technology has evolved very quickly during the last few years. A
digital watermark is information that is imperceptibly and robustly embedded in the host data …

DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure

JR Hernandez, M Amado… - IEEE transactions on …, 2000 - ieeexplore.ieee.org
A spread-spectrum-like discrete cosine transform (DCT) domain watermarking technique for
copyright protection of still digital images is analyzed. The DCT is applied in blocks of 8/spl …

The first 50 years of electronic watermarking

IJ Cox, ML Miller - EURASIP Journal on Advances in Signal Processing, 2002 - Springer
Electronic watermarking can be traced back as far as 1954. The last 10 years has seen
considerable interest in digital watermarking, due, in large part, to concerns about illegal …

Watermarking as communications with side information

IJ Cox, ML Miller, AL McKellips - Proceedings of the IEEE, 1999 - ieeexplore.ieee.org
Several authors have drawn comparison between embedded signaling or watermarking and
communications, especially spread-spectrum communications. We examine the similarities …

A buyer-seller watermarking protocol

N Memon, PW Wong - IEEE Transactions on image processing, 2001 - ieeexplore.ieee.org
Digital watermarks have previously been proposed for the purposes of copy protection and
copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts …

Image steganography and steganalysis: Concepts and practice

R Chandramouli, M Kharrazi, N Memon - … 20-22, 2003. Revised Papers 2, 2004 - Springer
In the last few years, we have seen many new and powerful steganography and
steganalysis techniques reported in the literature. In the following paper we go over some …