2000
DOI: 10.1109/30.883387
|View full text |Cite
|
Sign up to set email alerts
|

A robust DCT-based watermarking for copyright protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
44
0
1

Year Published

2006
2006
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 279 publications
(45 citation statements)
references
References 11 publications
0
44
0
1
Order By: Relevance
“…The watermark is embedded in to the perceptually most significant portion of the signal with spread-spectrum scheme. Lin and Chen also proposed a DCT-based watermarking scheme [8]. Their method embeds the watermark into the low-frequency coefficients.…”
Section: Introductionmentioning
confidence: 99%
“…The watermark is embedded in to the perceptually most significant portion of the signal with spread-spectrum scheme. Lin and Chen also proposed a DCT-based watermarking scheme [8]. Their method embeds the watermark into the low-frequency coefficients.…”
Section: Introductionmentioning
confidence: 99%
“…[5][6][7] These techniques take the secret data to be protected as the watermark and embed it into the carrier. However, the most important mission the watermarking techniques must accomplish is to prevent any attacker from removing the watermark from the cover image.…”
Section: Introductionmentioning
confidence: 99%
“…The calculation of mean value is addressed in (4). 3) Use the secret key KeyA to obtain the estimative watermark with exclusive-or operation as show in (7).…”
Section: The Extracting Phasementioning
confidence: 99%
“…Invisible watermarking, as the name suggests, the watermark is imperceptible in the watermarked image. Invisible watermarking can be classified into three types, robust [4,5,8], fragile [1,3,6] and semi-fragile [7].…”
Section: Introductionmentioning
confidence: 99%