2011 IEEE International Symposium of Circuits and Systems (ISCAS) 2011
DOI: 10.1109/iscas.2011.5938151
|View full text |Cite
|
Sign up to set email alerts
|

Forensic data hiding optimized for JPEG 2000

Abstract: Abstract-This paper presents a novel image adaptive data hiding system using properties of the discrete wavelet transform and which is ready to use in combination with JPEG 2000. Image adaptive watermarking schemes determine the embedding samples and strength from the image statistics. We propose to use the energy of wavelet coefficients at high frequencies to measure the amount of distortion that can be tolerated by a lower frequency coefficient. The watermark decoder in image adaptive data hiding needs to es… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Another example is robust digital watermarking, where a message is embedded into a media file and an attacker seeks to make the message unreadable. An effective attack is to cause loss of synchronisation; synchronisation‐correcting codes have been successfully applied to resist these attacks in speech [4] and image [5] watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…Another example is robust digital watermarking, where a message is embedded into a media file and an attacker seeks to make the message unreadable. An effective attack is to cause loss of synchronisation; synchronisation‐correcting codes have been successfully applied to resist these attacks in speech [4] and image [5] watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…Another example is robust digital watermarking, where a message is embedded into a media file and an attacker seeks to make the message unreadable. An effective attack is to cause loss of synchronization; synchronization-correcting codes have been successfully applied to resist these attacks in speech [4] and image [5] watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…insertion and deletion) errors has been considered early in the development of coding theory [1]. Practical schemes have recently received considerable attention, due to the emergence of applications where such codes are necessary, for example in image watermarking [2] and bit-patterned magnetic media [3]. A survey of error-correcting codes for synchronizationerror channels can be found in [4].…”
Section: Introductionmentioning
confidence: 99%