1997
DOI: 10.1117/12.263418
|View full text |Cite
|
Sign up to set email alerts
|

<title>Robust labeling methods for copy protection of images</title>

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

1998
1998
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(41 citation statements)
references
References 0 publications
0
41
0
Order By: Relevance
“…The results of these experiments show that this method is robust against the above attacks. Moreover, we show superiority of the proposed method over some well-known embedding methods, by comparing our results to those of the methods given in (Cox et al, 1997;Langelaar et al, 1997;M.Wang et al, 1998) that embed the watermark in different domains. It is to be noted that we have used FastICA algorithm (Hyvärinen, 1999) in our simulations.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The results of these experiments show that this method is robust against the above attacks. Moreover, we show superiority of the proposed method over some well-known embedding methods, by comparing our results to those of the methods given in (Cox et al, 1997;Langelaar et al, 1997;M.Wang et al, 1998) that embed the watermark in different domains. It is to be noted that we have used FastICA algorithm (Hyvärinen, 1999) in our simulations.…”
Section: Resultsmentioning
confidence: 99%
“…In the watermarked image that is shown in Fig. 14(a), PSNR is equal to 52.87dB, whereas the PSNR in the methods of (Cox et al, 1997), (Langelaar et al, 1997) and (M. Wang et al, 1998) are equal to 38.4dB, 36.7dB and 34.2dB, respectively. To study the extraction process, we use Bite Error Rate (BER) that is defined as: BER = Number of error bits Number of total embedded bits .…”
Section: Simulation Setupmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to conventional identification solutions such as the insertion of visual logos into the image or video data, and protection of the data through scrambling or encryption of the imagery or bit streams, the recently introduced data labeling or watermarking technique is being considered as a viable alternative [1], [2], [13], [26], [29]. By embedding an invisible and robust watermark into the image or video data, unauthorized copies can be traced [6], [8], [15], [17], [28] and copy protection schemes can be implemented [11], [12], [14]. There are several approaches to embed a watermark into an image or video frame.…”
Section: Introductionmentioning
confidence: 99%