2000
DOI: 10.1007/10719724_19
|View full text |Cite
|
Sign up to set email alerts
|

A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking

Abstract: Abstract. This paper proposes a new approach for assessing the presence of a digital watermark in images and videos. This approach relies on a Bayesian formulation that allows to compute the probability that a watermark was generated using a given key. The watermarking itself relies on the discrete Fourier transform (DFT) of the image, of video frames or of three dimensional chunks of video scene. Two kinds of information are hidden in the digital data: a watermark and a template. Both are encoded using an own… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2000
2000
2012
2012

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 12 publications
0
18
0
Order By: Relevance
“…It is a well-known fact [18] that many existing image watermarking algorithms are vulnerable to this kind of attacks. There have been some efforts and progress in addressing this issue [12][13][14][15][19][20][21][22][23][24][25][26][27][28][29]. Among various techniques that have appeared in the literature, we are most interested in the invariant watermarking approach, which is based on the invariance property of some image features.…”
Section: Introductionmentioning
confidence: 99%
“…It is a well-known fact [18] that many existing image watermarking algorithms are vulnerable to this kind of attacks. There have been some efforts and progress in addressing this issue [12][13][14][15][19][20][21][22][23][24][25][26][27][28][29]. Among various techniques that have appeared in the literature, we are most interested in the invariant watermarking approach, which is based on the invariance property of some image features.…”
Section: Introductionmentioning
confidence: 99%
“…As explained in the introduction, some current attacks operate by disrupting synchronization. Such attacks do not actually remove or destroy the watermark, so a more sophisticated receiver should be able to resynchronize [24,17,7,6,18]. Hence, we assume synchronization throughout this paper.…”
Section: Watermark Receptionmentioning
confidence: 99%
“…In order to reduce the performance degradation under certain attacks such as geometric attacks and to take advantage of the properties of certain transform domain, the message embedding can be performed in different domains such as the discrete cosine transform (DCT) domain [27], the discrete Fourier transform (DFT) domain [28][29][30][31], and the discrete wavelet transform (DWT) domain [32,33].…”
Section: Introductionmentioning
confidence: 99%