The role of information theory in watermarking and its application to image watermarking
P Moulin - Signal Processing, 2001 - Elsevier
This paper reviews the role of information theory in characterizing the fundamental limits of
watermarking systems and in guiding the development of optimal watermark embedding …
watermarking systems and in guiding the development of optimal watermark embedding …
Data-hiding codes
P Moulin, R Koetter - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
This tutorial paper reviews the theory and design of codes for hiding or embedding
information in signals such as images, video, audio, graphics, and text. Such codes have …
information in signals such as images, video, audio, graphics, and text. Such codes have …
Digital image watermarking using balanced multiwavelets
L Ghouti, A Bouridane, MK Ibrahim… - IEEE transactions on …, 2006 - ieeexplore.ieee.org
In this paper, a robust watermarking algorithm using balanced multiwavelet transform is
proposed. The latter transform achieves simultaneous orthogonality and symmetry without …
proposed. The latter transform achieves simultaneous orthogonality and symmetry without …
Combinational image watermarking in the spatial and frequency domains
FY Shih, SYT Wu - Pattern Recognition, 2003 - Elsevier
In order to provide more watermarks and to minimize the distortion of the watermarked
image, a novel technique using the combinational spatial and frequency domains is …
image, a novel technique using the combinational spatial and frequency domains is …
An improved SVD-based watermarking scheme for protecting rightful ownership
AA Mohammad, A Alhaj, S Shaltaf - Signal Processing, 2008 - Elsevier
In this paper, a new SVD-based digital watermarking scheme for ownership protection is
proposed. The proposed algorithm solves the problem of false-positive detection. In …
proposed. The proposed algorithm solves the problem of false-positive detection. In …
Image steganography and steganalysis: Concepts and practice
In the last few years, we have seen many new and powerful steganography and
steganalysis techniques reported in the literature. In the following tutorial we go over some …
steganalysis techniques reported in the literature. In the following tutorial we go over some …
Is image steganography natural?
A Martin, G Sapiro, G Seroussi - IEEE Transactions on Image …, 2005 - ieeexplore.ieee.org
Steganography is the art of secret communication. Its purpose is to hide the presence of
information, using, for example, images as covers. We experimentally investigate if stego …
information, using, for example, images as covers. We experimentally investigate if stego …
Robust image-adaptive data hiding using erasure and error correction
Information-theoretic analyses for data hiding prescribe embedding the hidden data in the
choice of quantizer for the host data. We propose practical realizations of this prescription for …
choice of quantizer for the host data. We propose practical realizations of this prescription for …
Digital image watermarking: its formal model, fundamental properties and possible attacks
While formal definitions and security proofs are well established in some fields like
cryptography and steganography, they are not as evident in digital watermarking research. A …
cryptography and steganography, they are not as evident in digital watermarking research. A …
Performance analysis of existing and new methods for data hiding with known-host information in additive channels
F Pérez-González, F Balado… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
A considerable amount of attention has been paid lately to a number of data hiding methods
based in quantization, seeking to achieve in practice the results predicted by Costa (1983) …
based in quantization, seeking to achieve in practice the results predicted by Costa (1983) …