2015
DOI: 10.1007/978-981-10-0281-6_54
|View full text |Cite
|
Sign up to set email alerts
|

A Zero-Watermarking Scheme Based on Spread Spectrum and Holography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…According to the watermark embedding algorithm, most watermarking schemes fall into one of two categories: the spread spectrum (SS) and the quantization index modulation (QIM) techniques. In the former (SS), the watermark is spread across all host data during embedding stage, and correlation approaches are used to either extract the watermark bits 12 or just decide about the presence or absence of the watermark in case of zero bit watermarking 13 . In the latter technique (QIM), a two sets of discrete quantizers, one for bit 1 and another for bit 0, are generated and each host coefficient is substituted by the closest quantizer according to the watermark bit to embed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the watermark embedding algorithm, most watermarking schemes fall into one of two categories: the spread spectrum (SS) and the quantization index modulation (QIM) techniques. In the former (SS), the watermark is spread across all host data during embedding stage, and correlation approaches are used to either extract the watermark bits 12 or just decide about the presence or absence of the watermark in case of zero bit watermarking 13 . In the latter technique (QIM), a two sets of discrete quantizers, one for bit 1 and another for bit 0, are generated and each host coefficient is substituted by the closest quantizer according to the watermark bit to embed.…”
Section: Introductionmentioning
confidence: 99%
“…In the former (SS), the watermark is spread across all host data during embedding stage, and correlation approaches are used to either extract the watermark bits 12 or just decide about the presence or absence of the watermark in case of zero bit watermarking. 13 In the latter technique (QIM), a two sets of discrete quantizers, one for bit 1 and another for bit 0, are generated and each host coefficient is substituted by the closest quantizer according to the watermark bit to embed. The same principle is used to extract the watermark using minimum distance classifier.…”
Section: Introductionmentioning
confidence: 99%