2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590)
DOI: 10.1109/africon.2004.1406827
|View full text |Cite
|
Sign up to set email alerts
|

Digital watermarking for copyright protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…In robust watermarking schemes the watermark is designed such that it can stand malicious attacks like deletion, modification, and cropping. Robust watermarking is used mainly for copyright protection [ 21 , 22 ]. Fragile watermarking embeds the watermark (secret message) into the data stream in such a way that any change or tampering with the original data would corrupt the watermark.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In robust watermarking schemes the watermark is designed such that it can stand malicious attacks like deletion, modification, and cropping. Robust watermarking is used mainly for copyright protection [ 21 , 22 ]. Fragile watermarking embeds the watermark (secret message) into the data stream in such a way that any change or tampering with the original data would corrupt the watermark.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A different hash algorithm (SHA-1) was used by Samuel and Penzhom [17] for copyright protection of images. In 2005 distinct attacks were launched on MD-5 and SHA-1 algorithms.…”
Section: Watermarking With Hashingmentioning
confidence: 99%
“…Perceptible watermarks are especially useful for conveying an immediate claim of ownership [3]. The main advantage is that they virtually eliminate the commercial value of the document to a would-be thief without lessening the document's utility for legitimate purposes.…”
Section: Fig 1: Types Of Watermarkingmentioning
confidence: 99%