2004
DOI: 10.1109/tmm.2003.819759
|View full text |Cite
|
Sign up to set email alerts
|

Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
64
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 128 publications
(64 citation statements)
references
References 9 publications
0
64
0
Order By: Relevance
“…There are various watermarking techniques for embedding data into the image. They may be divided into spatial domain techniques [3], [4] and frequency domain techniques [1], [5], [6], [7]. Although techniques in the spatial domain have the lowest complexity and large load capacity, they cannot withstand attacks such as image processing and low-pass filtering [8].…”
Section: Related Workmentioning
confidence: 99%
“…There are various watermarking techniques for embedding data into the image. They may be divided into spatial domain techniques [3], [4] and frequency domain techniques [1], [5], [6], [7]. Although techniques in the spatial domain have the lowest complexity and large load capacity, they cannot withstand attacks such as image processing and low-pass filtering [8].…”
Section: Related Workmentioning
confidence: 99%
“…The spatial domain watermarking algorithms [3,4]mainly embed the watermark by modulating the image pixels or altering its gray values directly, such as the least significant bit (LSB) and so on. These algorithms are fragile to manipulations, but they have little computation work and can be easily implemented.…”
Section: Introductionsmentioning
confidence: 99%
“…Also watermarking can be categorized from another point of view into three groups fragile, semi fragile and robust, where fragile means the watermark can be lost or corrupted after applying any type of image processing attacks, semi fragile the watermark resist only light attacks such as compression, and robust watermarking is when the watermark resist all common processing attacks and the last factor that watermarking schemes can be categorized about is blindness, a non blind watermarking schemes is when the original image is required for the extraction of the watermark, semi blind is when a part of an image is required and a blind scheme is when we don't need the original image or a part of it to recover the watermark only a key can be required in some cases. The watermarking schemes in [1][2][3][4] are in spatial domain they are robust against geometrical attacks but they suffer from the poor capacity of data embedding, this drawback led other researchers to propose watermarking schemes in frequency domain [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24], most of those methods are semi or non blind like [5,6,7,8,9,13,14,19] which means the host image is required in the extraction procedure, also some methods has a good robustness but they don't offer a good transparency like [13,14,16,19]. In most applications of watermarking the main concern has been the robustness against common digital attacks but usually resolving rightful ownership deadlock is ign...…”
Section: Introductionmentioning
confidence: 99%