In this paper, we introduce a new robust watermarking technique, which is called two-level quantization based spread-spectrum (TQSS). In this method, the selected transform coefficients of the cover signal are two-level quantized to a predefined threshold, which is determined by the estimated bound of distortion. The two-level quantizer is again used for watermark retrieval. Thus, the watermark signal is essentially embedded into the polarities of the transform coefficients. Our simulation results showed that TQSS outperformed some common spread-spectrum (SS) methods under a variety of attacks, such as lossy compression, additive Gaussian white noise, filtering, scaling and print-and-scan process. </p
Copyright notification and enforcement, authentication, covert communication, and hybrid transmissio...
We describe a digital watermarking method for use in au-dio, image, video and multimedia data. We ar...
Abstract Here, we propose a new method for the watermarking to withstand the geometric attacks, whi...
Spread spectrum and quantization are two basic techniques of digital watermarking. Spread spectrum w...
This paper presents a new multibit watermarking method. The method uses multiple orthonormalized wat...
This paper presents a new multibit watermarking method. The method uses multiple orthonormalized wat...
This paper presents a robust approach for spread spectrum (SS) based watermarking process. Unlike th...
In this paper we perform the capacity analysis of known-host-statitistics watermarking methods based...
grantor: University of TorontoDigital watermarking technology is an approach for the prote...
In this paper a robust watermarking technique based on Vector Quantization and the preciously develo...
This thesis describes a digital watermarking method using the principle of spread spectrum communica...
In our transform-domain-based watermarking algorithms, two-level quantization is employed for both w...
The massive production and easy use of digital media pose new challenges on protecting intellectual ...
In this paper the robustness of a recently proposed image watermarking scheme, namely the Double Ran...
A new technique utilizing Scalar Quantization is designed in this paper in order to be used for Digi...
Copyright notification and enforcement, authentication, covert communication, and hybrid transmissio...
We describe a digital watermarking method for use in au-dio, image, video and multimedia data. We ar...
Abstract Here, we propose a new method for the watermarking to withstand the geometric attacks, whi...
Spread spectrum and quantization are two basic techniques of digital watermarking. Spread spectrum w...
This paper presents a new multibit watermarking method. The method uses multiple orthonormalized wat...
This paper presents a new multibit watermarking method. The method uses multiple orthonormalized wat...
This paper presents a robust approach for spread spectrum (SS) based watermarking process. Unlike th...
In this paper we perform the capacity analysis of known-host-statitistics watermarking methods based...
grantor: University of TorontoDigital watermarking technology is an approach for the prote...
In this paper a robust watermarking technique based on Vector Quantization and the preciously develo...
This thesis describes a digital watermarking method using the principle of spread spectrum communica...
In our transform-domain-based watermarking algorithms, two-level quantization is employed for both w...
The massive production and easy use of digital media pose new challenges on protecting intellectual ...
In this paper the robustness of a recently proposed image watermarking scheme, namely the Double Ran...
A new technique utilizing Scalar Quantization is designed in this paper in order to be used for Digi...
Copyright notification and enforcement, authentication, covert communication, and hybrid transmissio...
We describe a digital watermarking method for use in au-dio, image, video and multimedia data. We ar...
Abstract Here, we propose a new method for the watermarking to withstand the geometric attacks, whi...