2006
DOI: 10.3745/jips.2006.2.2.082
|View full text |Cite
|
Sign up to set email alerts
|

Data-Hiding Method using Digital Watermark in the Public Multimedia Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Various DWT based watermarking techniques have been proposed which provide greater robustness [6,7,10,12,13,14]. Hsieh [6] proposed an approach by using the concept of Zerotree from Embedded Zerotree Wavelet (EZW) coding introduced by Shapiro [3].…”
Section: Introductionmentioning
confidence: 99%
“…Various DWT based watermarking techniques have been proposed which provide greater robustness [6,7,10,12,13,14]. Hsieh [6] proposed an approach by using the concept of Zerotree from Embedded Zerotree Wavelet (EZW) coding introduced by Shapiro [3].…”
Section: Introductionmentioning
confidence: 99%
“…Now all of them are key based whose strength depends on the key size and also the executions of such techniques are computationally intensive. Moreover they convert plaintext to cipher text, thus attracting the attention of attackers with more seriousness [6,7]. The conventional encryption techniques require message block sizes of 64 bits or higher and requires intensive mathematical operations which make it less vulnerable to crypto analysis.…”
mentioning
confidence: 99%