2003
DOI: 10.1078/1434-8411-54100185
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Optimal Watermark Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(25 citation statements)
references
References 8 publications
0
25
0
Order By: Relevance
“…The DCT coefficients are also reordered into a zig-zag sequence, and the first DCT coefficient, i.e. the DC term, should be not modified [1][2][3][4][5][6][7][8]. The coefficients from the (L + 1)th to the (L + 100M 2 )th positions are taken out according to the above zig-zag sequence of the DCT spectrum, as shown in Fig.…”
Section: Watermark Castingmentioning
confidence: 99%
See 1 more Smart Citation
“…The DCT coefficients are also reordered into a zig-zag sequence, and the first DCT coefficient, i.e. the DC term, should be not modified [1][2][3][4][5][6][7][8]. The coefficients from the (L + 1)th to the (L + 100M 2 )th positions are taken out according to the above zig-zag sequence of the DCT spectrum, as shown in Fig.…”
Section: Watermark Castingmentioning
confidence: 99%
“…Digital watermarking has recently received great attention as a tool for copyright protection [1][2][3][4][5][6][7][8][9][10]. A digital watermark contains information about the copyright owner, the authorized consumer or other information that is desired to be embedded.…”
Section: Introductionmentioning
confidence: 99%
“…The digital watermarking provides data protection [9], [10]. In the digital watermarking, the embedded algorithm (encoder) inserts any information or data to the measurement matrix.…”
Section: Introductionmentioning
confidence: 99%
“…For these non-Gaussian probability density functions (pdf), a locally optimum detector is usually derived for watermark detection [17,19,20,[26][27][28][29]. Especially, Barni et al noted that the proposed watermark embedding rule in [16,18] does not obey an additive rule, and presented a new decoder for the optimum recovery of watermarks [17].…”
Section: Introductionmentioning
confidence: 99%
“…So far, there are mainly two main proposed watermarking techniques, i.e., embedding the watermark in the spatial domain [1, 5-7, 12, 13] or in the transformed domain [1,6,11,16,18,26,27] of a host image. It has been shown that the discrete cosine transformation (DCT) coefficients of images have interesting properties that can be exploited for watermark detection [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29].…”
Section: Introductionmentioning
confidence: 99%