2001
DOI: 10.1109/35.940055
|View full text |Cite
|
Sign up to set email alerts
|

Engineering considerations in commercial watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2002
2002
2011
2011

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…These gray level values will be different from that of the source document because transformation Ì ½ has been occurred during halftoning process and transformation Ì ¾ has been occurred during scanning process. Now, we can compute the composite transformation Ì , resulting for a particular combination of printer and scanner, and it can be estimated by using the popular polynomial interpolation technique which is as shown as equation (6). (6) are Coefficients.…”
Section: Proposed Guide Line For Measuring a Print-scan Transformentioning
confidence: 99%
See 2 more Smart Citations
“…These gray level values will be different from that of the source document because transformation Ì ½ has been occurred during halftoning process and transformation Ì ¾ has been occurred during scanning process. Now, we can compute the composite transformation Ì , resulting for a particular combination of printer and scanner, and it can be estimated by using the popular polynomial interpolation technique which is as shown as equation (6). (6) are Coefficients.…”
Section: Proposed Guide Line For Measuring a Print-scan Transformentioning
confidence: 99%
“…Now, we can compute the composite transformation Ì , resulting for a particular combination of printer and scanner, and it can be estimated by using the popular polynomial interpolation technique which is as shown as equation (6). (6) are Coefficients.…”
Section: Proposed Guide Line For Measuring a Print-scan Transformentioning
confidence: 99%
See 1 more Smart Citation
“…There is an inherent tradeoff between many of these attributes that plays a critical role in a real-world application. At the detector, robustness, false positive rate and speed often compete with each other [6]. During detector design these attributes must be balanced, to meet the application requirements.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, digital content can be easily copied and illegally distributed over the Internet. Hence, there is a strong need of developing the techniques which can help to identify intellectual property of digital documents, see [1]. Digital Watermarking has emerged as a solution for protecting the intellectual property of digital data [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%