Fast digital watermarking techniques for still images

Author(s):  
Mohamed A. Mohamed ◽  
Mohy El-Din A. Abou-Soud ◽  
Mai S. Diab
2000 ◽  
Vol 46 (1) ◽  
pp. 137-145 ◽  
Author(s):  
Xia-Mu Niu ◽  
Zhe-Ming Lu ◽  
Sheng-He Sun

Author(s):  
Abdul R. Zubair ◽  
Olasebikan A. Fakolujo ◽  
Periasamy K. Rajan

2018 ◽  
Vol 4 (3) ◽  
pp. 5
Author(s):  
Garima Bhargava ◽  
Arun Jhapate

Digital watermarking was introduced as a result of rapid advancement of networked multimedia systems. It had been developed to enforce copyright technologies for cover of copyright possession. This technology is first used for still images however recently they need been developed for different multimedia objects like audio, video etc. Watermarking, that belong to the information hiding field, has seen plenty of research interest. There's a lot of work begin conducted in numerous branches in this field. The image watermarking techniques might divide on the idea of domain like spatial domain or transform domain or on the basis of wavelets. The copyright protection, capacity, security, strength etc are a number of the necessary factors that are taken in account whereas the watermarking system is intended. This paper aims to produce a detailed survey of all watermarking techniques specially focuses on image watermarking types and its applications in today’s world.


10.28945/2626 ◽  
2003 ◽  
Author(s):  
Supot Nitsuwat ◽  
J. Srisomphun

Computer-based instruction assistance (CAI) plays very important role in e-leaming system. Distancelearning students can remotely access this kind of course materials. However, being an electronic form has created a growing need to protect them against illegal manipulation and duplication. Therefore, the more robust techniques are needed. Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia for many decades. This technique can also be applied to the educational frameworks. In this paper, before the CAI will be distributed, double watermarks have been embedded into all still images in the CAI materials. Firstly, the visible watermark, e.g., university’s logo, is inserted directly on image pixel’s intensity to exhibit an ownership of the CAI. The fragile invisible watermark is then embedded again on these watermarked images. Because of the special characteristic of the latter if there is any attempt to change or remove the visible logo, it can be clearly detected. We also proposed the extracting method to reveal secret information using for verifying our right on the materials. The experiments using different kinds of attacks on the materials are also conducted. Finally, the discussion of the experimental results and conclusion of the paper are also given.


Sign in / Sign up

Export Citation Format

Share Document