Proceedings. IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241)
DOI: 10.1109/mmcs.1998.693656
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking methods for MPEG encoded video: towards resolving rightful ownership

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
26
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(26 citation statements)
references
References 8 publications
0
26
0
Order By: Relevance
“…Over the last decade, numerous software implementations of WM algorithms for relatively low data rate signals (such as audio and image data) have been invented [6], [7]. While the software approach has the advantage of flexibility, computational limitations may arise when attempting to utilize these WM methods for video signals or in portable devices.…”
Section: B Watermark Implementations-hardware Versus Softwarementioning
confidence: 99%
See 1 more Smart Citation
“…Over the last decade, numerous software implementations of WM algorithms for relatively low data rate signals (such as audio and image data) have been invented [6], [7]. While the software approach has the advantage of flexibility, computational limitations may arise when attempting to utilize these WM methods for video signals or in portable devices.…”
Section: B Watermark Implementations-hardware Versus Softwarementioning
confidence: 99%
“…Because of its commercial potential applications, current digital WM techniques have focused on multimedia data and in particular on video contents. Over the past few years, researchers have investigated the embedding process of visible or invisible digital watermarks into raw digital video [6], uncompressed digital video both on software [6]- [7], and hardware platforms [8]- [12]. Contrary to still image WM techniques, new problems and new challenges have emerged in video WM applications.…”
Section: Introductionmentioning
confidence: 99%
“…By programming the code and making use of available software tools, it can be easy to design and implement any WM algorithm at various levels of complexity. Over the last decade, numerous software implementations of WM algorithms for relatively low data rate signals (such as audio and image data) have been invented [7]- [11]. While the software approach has the advantage of flexibility, computational limitations may arise when attempting to utilize these WM methods for video signals or in portable devices.…”
Section: B Watermark Implementations-hardware Versus Softwarementioning
confidence: 99%
“…Because of its commercial potential applications, current digital WM techniques have focused on multimedia data and in particular on video contents. Over the past few years, researchers have investigated the embedding process of visible or invisible digital watermarks into raw digital video [7], uncompressed digital video both on software [7]- [11], and hardware platforms [12]- [16]. Contrary to still image WM techniques, new problems and new challenges have emerged in video WM applications.…”
mentioning
confidence: 99%
“…Inserting a unique watermark ID for each customer transmitted through Pay-Per-View and Video-On-Demand services enables it to trace back traitor users (Lin, 2001). But its first targeted application is copyright protection, in which the owner inserts its registered watermark into the digital property to prove its paternity in the case of finding an illegally copied version (Qiao, 1998).…”
Section: Introductionmentioning
confidence: 99%