2012
DOI: 10.1016/j.ins.2012.06.014
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(6 citation statements)
references
References 45 publications
0
6
0
Order By: Relevance
“…Recently, the rapid technological developments of 3D image and video processing have led to an explosion in demand for 3D content [20] . 3D can bring consumers stereo perception and immersive viewing experiences, and can be displayed not only in movie theaters, but also on home electronics, e.g., television, smartphones, and tablets.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, the rapid technological developments of 3D image and video processing have led to an explosion in demand for 3D content [20] . 3D can bring consumers stereo perception and immersive viewing experiences, and can be displayed not only in movie theaters, but also on home electronics, e.g., television, smartphones, and tablets.…”
Section: Introductionmentioning
confidence: 99%
“…To this end, the depth image is first converted to a bitstream and then embedded in the wavelet [20] and DCT [35] transformed coefficients. However, the transform domain lossless data hiding techniques have the aforementioned disadvantages, i.e., degraded quality of decoded image and increased length of bitstream.…”
Section: Introductionmentioning
confidence: 99%
“…However, the transform domain lossless data hiding techniques have the aforementioned disadvantages, i.e., degraded quality of decoded image and increased length of bitstream. More importantly, conventional techniques [20,35] do not carefully consider inherent similarities between the color and depth images when generating information bits from the depth image.…”
Section: Introductionmentioning
confidence: 99%
“…Image forgery detection techniques can be classified into two categories: active methods and passive methods. Active methods such as watermarking [1] and illegal image copy detection [2][3][4] depend on prior information about the original image. However, in many situations, prior information regarding an image is not available.…”
Section: Introductionmentioning
confidence: 99%