The role of information theory in watermarking and its application to image watermarking

P Moulin - Signal Processing, 2001 - Elsevier
This paper reviews the role of information theory in characterizing the fundamental limits of
watermarking systems and in guiding the development of optimal watermark embedding …

Data-hiding codes

P Moulin, R Koetter - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
This tutorial paper reviews the theory and design of codes for hiding or embedding
information in signals such as images, video, audio, graphics, and text. Such codes have …

Digital image watermarking using balanced multiwavelets

L Ghouti, A Bouridane, MK Ibrahim… - IEEE transactions on …, 2006 - ieeexplore.ieee.org
In this paper, a robust watermarking algorithm using balanced multiwavelet transform is
proposed. The latter transform achieves simultaneous orthogonality and symmetry without …

Combinational image watermarking in the spatial and frequency domains

FY Shih, SYT Wu - Pattern Recognition, 2003 - Elsevier
In order to provide more watermarks and to minimize the distortion of the watermarked
image, a novel technique using the combinational spatial and frequency domains is …

An improved SVD-based watermarking scheme for protecting rightful ownership

AA Mohammad, A Alhaj, S Shaltaf - Signal Processing, 2008 - Elsevier
In this paper, a new SVD-based digital watermarking scheme for ownership protection is
proposed. The proposed algorithm solves the problem of false-positive detection. In …

Image steganography and steganalysis: Concepts and practice

M Kharrazi, HT Sencar, N Memon - Mathematics And Computation …, 2007 - World Scientific
In the last few years, we have seen many new and powerful steganography and
steganalysis techniques reported in the literature. In the following tutorial we go over some …

Is image steganography natural?

A Martin, G Sapiro, G Seroussi - IEEE Transactions on Image …, 2005 - ieeexplore.ieee.org
Steganography is the art of secret communication. Its purpose is to hide the presence of
information, using, for example, images as covers. We experimentally investigate if stego …

Robust image-adaptive data hiding using erasure and error correction

K Solanki, N Jacobsen, U Madhow… - … on image processing, 2004 - ieeexplore.ieee.org
Information-theoretic analyses for data hiding prescribe embedding the hidden data in the
choice of quantizer for the host data. We propose practical realizations of this prescription for …

Digital image watermarking: its formal model, fundamental properties and possible attacks

H Nyeem, W Boles, C Boyd - EURASIP Journal on Advances in Signal …, 2014 - Springer
While formal definitions and security proofs are well established in some fields like
cryptography and steganography, they are not as evident in digital watermarking research. A …

Performance analysis of existing and new methods for data hiding with known-host information in additive channels

F Pérez-González, F Balado… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
A considerable amount of attention has been paid lately to a number of data hiding methods
based in quantization, seeking to achieve in practice the results predicted by Costa (1983) …