Academic literature on the topic 'Watermarking algorithms'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Watermarking algorithms.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Watermarking algorithms"

1

Wu, Shun Wei. "Research on Intelligent Image Watermarking Schemes Based on Optimization Algorithm." Advanced Materials Research 1006-1007 (August 2014): 792–96. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.792.

Full text
Abstract:
Watermarking algorithms are the one of the effective methods to protect the copyright of digital products. There are many types of watermarking algorithms, in this paper, methods based on optimization algorithms, also named computational intelligence, are surveyed. The detail procedure of watermark embedding and the watermarking extraction is described, and the basic theory application of computational intelligence is also analyzed. Finally, the advice of these types of watermarking algorithm is given.
APA, Harvard, Vancouver, ISO, and other styles
2

Xin, Yongqing, and Mirosław Pawlak. "M-Ary Phase Modulation for Digital Watermarking." International Journal of Applied Mathematics and Computer Science 18, no. 1 (2008): 93–104. http://dx.doi.org/10.2478/v10006-008-0009-8.

Full text
Abstract:
M-Ary Phase Modulation for Digital WatermarkingIn spread spectrum based watermarking schemes, it is a challenging task to embed multiple bits of information into the host signal.M-ary modulation has been proposed as an effective approach to multibit watermarking. It has been proved that anM-ary modulation based watermarking system outperforms significantly a binary modulation based watermarking system. However, in the existingM-ary modulation based algorithms, the value ofMis restricted to be less than 256, because asMincreases, the computation workload for data extraction advances exponential
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Lixuan. "Research on Digital Watermarking Algorithm for Anti-geometric Attack." MATEC Web of Conferences 267 (2019): 02007. http://dx.doi.org/10.1051/matecconf/201926702007.

Full text
Abstract:
For the problem that the traditional digital watermarking algorithm is less robustness against geometric attacks, this paper introduces the related content of digital watermarking technology, which combs digital watermarking technology, digital watermarking attack technology and digital watermarking evaluation method, and summarizes the improved algorithms proposed in recent years. Next, the traditional wavelet transform algorithm and the improved algorithm based on DCT transform are selected for comparison experiments. The latter combines Arnold scrambling and SVD decomposition, which has bet
APA, Harvard, Vancouver, ISO, and other styles
4

Fan, Li Jun. "Research on the Zero-Bit Watermarking Algorithms Based on the Matrix Decomposition for Digital Images." Applied Mechanics and Materials 738-739 (March 2015): 674–77. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.674.

Full text
Abstract:
Due to the problem that the many digital images can be modified more and more easily, watermarking algorithms are proposed. There are many types of digital watermarking algorithms, such as robust digital watermarking algorithms, watermarking schemes for authentication, and reversible digital watermarking algorithms. However, there are some special images, such as the digital medical images for remote treatment, the military images for tracking object, and the remote sensing images, and they are so sensitive to any modification that we should authenticate the copyright by special technique. And
APA, Harvard, Vancouver, ISO, and other styles
5

Peng, Yu Lou, Yi Gang He, and Bin Lin. "Functional Watermarking Algorithm Based on Contourlet Transform and ECC." Applied Mechanics and Materials 103 (September 2011): 187–93. http://dx.doi.org/10.4028/www.scientific.net/amm.103.187.

Full text
Abstract:
User-defined functional watermarking algorithm was presented based on contourlet transform field and Ellipse Curve Cryptography(ECC) spatial field. First the edge and direction information of image was obtained by contourlet transform, the discrete functional watermarking was embedded into high frequency parts, and the embedding data was avoided to the image edge. ECC encrypts embedding coordinate’s series. Watermarking changes little original image because of less function data, and attends to zero watermarking algorithms. The results show that the algorithm is invisible to watermarking and a
APA, Harvard, Vancouver, ISO, and other styles
6

Tan, Yanli, and Yongqiang Zhao. "Digital Watermarking Image Compression Method Based on Symmetric Encryption Algorithms." Symmetry 11, no. 12 (2019): 1505. http://dx.doi.org/10.3390/sym11121505.

Full text
Abstract:
A digital watermarking image compression method based on symmetrical encryption algorithm is proposed in this study. First, the original image and scrambled watermarking image are processed by wavelet transform, and then the watermarking image processed by the Arnold replacement method is transformed into a meaningless image in the time domain to achieve the effect of encryption. Watermarking is generated by embedding the watermarking image into the important coefficients of the wavelet transform. As an inverse process of watermarking embedding, watermarking extraction needs to be reconstructe
APA, Harvard, Vancouver, ISO, and other styles
7

LEUNG, H. Y., L. M. CHENG, and L. L. CHENG. "ROBUST WATERMARKING SCHEMES USING SELECTIVE CURVELET COEFFICIENTS BASED ON A HVS MODEL." International Journal of Wavelets, Multiresolution and Information Processing 08, no. 06 (2010): 941–59. http://dx.doi.org/10.1142/s0219691310003870.

Full text
Abstract:
In this paper, six robust non-blind watermarking schemes based on curvelet transform are proposed. Single band watermarking method was proposed in Ref. 1. This paper develops the single band watermarking method and adds Human Vision System (HVS) to form six different multi-bands watermarking methods. With the increasing redundancy of watermark, the robustness of the algorithm will be investigated and comparative studies with the single band watermarking will be shown. The experimental results demonstrate that the proposed algorithms have great robustness against various imaging attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

LU, HAIPING, YUN Q. SHI, ALEX C. KOT, and LIHUI CHEN. "BINARY IMAGE WATERMARKING THROUGH BLURRING AND BIASED BINARIZATION." International Journal of Image and Graphics 05, no. 01 (2005): 67–87. http://dx.doi.org/10.1142/s0219467805001665.

Full text
Abstract:
Digital watermarking has been proposed for the protection of digital medias. This paper presents two watermarking algorithms for binary images. Both algorithms involve a blurring preprocessing and a biased binarization. After the blurring, the first algorithm embeds a watermark by modifying the DC components of the Discrete Cosine Transform (DCT), followed by a biased binarization, and the second one embeds a watermark by directly biasing the binarization threshold of the blurred image, controlled by a loop. Experimental results show the imperceptibility and robustness aspects of both algorith
APA, Harvard, Vancouver, ISO, and other styles
9

Nawaz, Saqib Ali, Jingbing Li, Uzair Aslam Bhatti, et al. "A Novel Hybrid Discrete Cosine Transform Speeded Up Robust Feature-Based Secure Medical Image Watermarking Algorithm." Journal of Medical Imaging and Health Informatics 10, no. 11 (2020): 2588–99. http://dx.doi.org/10.1166/jmihi.2020.3220.

Full text
Abstract:
With the advancement of networks and multimedia, digital watermarking technology has received worldwide attention as an effective method of copyright protection. Improving the anti-geometric attack ability of digital watermarking algorithms using image feature-based algorithms have received extensive attention. This paper proposes a novel robust watermarking algorithm based on SURF-DCT perceptual hashing (Speeded Up Robust Features and Discrete Cosine Transform), namely blind watermarking. We design and implement a meaningful binary watermark embedding and extraction algorithm based on the SUR
APA, Harvard, Vancouver, ISO, and other styles
10

Duda, Sylwia, Dominik Fijałek, and Grzegorz Kozieł. "Comparative analysis of medical images watermarking methods." Journal of Computer Sciences Institute 17 (December 30, 2020): 379–83. http://dx.doi.org/10.35784/jcsi.2372.

Full text
Abstract:
The article is devoted to the analysis of watermarking algorithms in terms of their use in marking medical images. The algorithms based on the Integer Wavelet Transform (IWT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD) were compared. The algorithms were implemented using the combinations: IWT, IWT-DCT, and IWT-SVD. As part of the research, the level of disturbances caused by embedding the watermark was checked using subjective and objective methods. The attack resistance of the watermarked images was tested and the steganographic capacity was measured. All algorith
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Watermarking algorithms"

1

Gordy, James D. "Performance evaluation of digital watermarking algorithms." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0015/MQ49675.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cvejic, N. (Nedeljko). "Algorithms for audio watermarking and steganography." Doctoral thesis, University of Oulu, 2004. http://urn.fi/urn:isbn:9514273842.

Full text
Abstract:
Abstract Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for innovation. Versatile and simple-to-use software and decreasing prices of digital devices have made it possible for consumers from all around the world to create and exchange multimedia data. Broadband Internet connections and near error-free transmission of data facilitate people to distribute large multimedia files and make identical digital copies of them. A perfect reproduction in digital domain have promoted the protection of intellectual ownership and t
APA, Harvard, Vancouver, ISO, and other styles
3

Terzija, Nataša. "Robust digital image watermarking algorithms for copyright protection." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=982382553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liang, Te-Shen. "Methods for improved robustness of image watermarking algorithms." Diss., The University of Arizona, 2000. http://hdl.handle.net/10150/284164.

Full text
Abstract:
With the advent of multimedia technology and the popularity of Internet communications, there has been great interest in using digital watermarks for the purpose of copy protection and content authentication. Digital watermarking technology allows the content owner to embed a secret signature, i.e., watermark, into the host content for many applications. For digital watermarking, the major challenge lies in the confident verification of the embedded watermark, even after the watermarked content undergoes various forms of unintentional or malicious modification. Approaches aiming to guarantee r
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Bingwei. "Adaptive watermarking algorithms for MP3 compressed audio signals." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27963.

Full text
Abstract:
MPEG-1 Layer 3, known as MP3, has generated a significant popularity for distributing digital music over the Internet. MP3 compresses digital music with high ratio while keeping high sound quality. However, copyright issue is raised because of illegal copy, redistribution and various malicious attacks. Digital watermarking is a technology that allows users to embed some imperceptible data into digital contents such as image, movie and audio data. Once a watermark is embedded into the original MP3 signal, it can be used to identify the copyright holder in order to prevent illegal copy and to ve
APA, Harvard, Vancouver, ISO, and other styles
6

Kundar, Deepa. "Multiresolution digital watermarking, algorithms and implications for multimedia signals." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0021/NQ45689.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Serdean, Cristian Vasile. "Spread spectrum-based video watermarking algorithms for copyright protection." Thesis, University of Plymouth, 2002. http://hdl.handle.net/10026.1/2263.

Full text
Abstract:
Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago. The advantages offered by the digital technologies are major but the same digital technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly possible and relatively easy, in spite of various forms of protection, but due to the analogue environment, the subsequent copies had an inherent loss in quality. This was a natural way of limiting the multiple copying of a video material. Wi
APA, Harvard, Vancouver, ISO, and other styles
8

Parker, Kristen Michelle. "Watermarking with wavelet transforms." Master's thesis, Mississippi State : Mississippi State University, 2007. http://library.msstate.edu/etd/show.asp?etd=etd-11062007-153859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Wei. "Joint Compression and Digital Watermarking: Information-Theoretic Study and Algorithms Development." Thesis, University of Waterloo, 2006. http://hdl.handle.net/10012/2890.

Full text
Abstract:
In digital watermarking, a watermark is embedded into a covertext in such a way that the resulting watermarked signal is robust to certain distortion caused by either standard data processing in a friendly environment or malicious attacks in an unfriendly environment. The watermarked signal can then be used for different purposes ranging from copyright protection, data authentication,fingerprinting, to information hiding. In this thesis, digital watermarking will be investigated from both an information theoretic viewpoint and a numerical computation viewpoint. <br /><br /> From the i
APA, Harvard, Vancouver, ISO, and other styles
10

Jassim, Taha D. "Combined robust and fragile watermarking algorithms for still images. Design and evaluation of combined blind discrete wavelet transform-based robust watermarking algorithms for copyright protection using mobile phone numbers and fragile watermarking algorithms for content authentication of digital still images using hash functions." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/6460.

Full text
Abstract:
This thesis deals with copyright protection and content authentication for still images. New blind transform domain block based algorithms using one-level and two-level Discrete Wavelet Transform (DWT) were developed for copyright protection. The mobile number with international code is used as the watermarking data. The robust algorithms used the Low-Low frequency coefficients of the DWT to embed the watermarking information. The watermarking information is embedded in the green channel of the RGB colour image and Y channel of the YCbCr images. The watermarking information is scrambled
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Watermarking algorithms"

1

mPDF: Framework for Watermarking PDF Files using Image Watermarking Algorithms. arXiv, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mathai, Nebu John. VLSI implementation of digital videon watermarking algorithms. 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kundur, Deepa. Multiresolution digital watermarking: Algorithms and implications for multimedia signals. 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

A DCT-Based Watermarking Algorithm Robust To Cropping and Compression. Storming Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Watermarking algorithms"

1

Arya, Vivek, and Nilam Choudhary. "RGB Image Watermarking Using DCT." In Algorithms for Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6307-6_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Feng, Bingwen, Jian Weng, and Wei Lu. "Improved Algorithms for Robust Histogram Shape-Based Image Watermarking." In Digital Forensics and Watermarking. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64185-0_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Patsariya, Sanjay, and Manish Dixit. "A Survey on Watermarking and Its Techniques." In Algorithms for Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4893-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Piper, Angela, and Reihaneh Safavi-Naini. "How to Compare Image Watermarking Algorithms." In Transactions on Data Hiding and Multimedia Security IV. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01757-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hussain, Omer Bin, Abdul Razak, and Justin Varghese. "Comparative Analysis of Prominent Watermarking Algorithms." In Innovations in Computer Science and Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8201-6_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gosavi, Chhaya S., and Suresh N. Mali. "Analysis of Blind Image Watermarking Algorithms." In Intelligent Computing and Information and Communication. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7245-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eppstein, David, Michael T. Goodrich, Jenny Lam, Nil Mamano, Michael Mitzenmacher, and Manuel Torres. "Models and Algorithms for Graph Watermarking." In Lecture Notes in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45871-7_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lu, Zhe-Ming, Hans Burkhardt, and Shu-Chuan Chu. "Multipurpose Image Watermarking Algorithms and Applications." In Intelligent Multimedia Data Hiding. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71169-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Wei-Hung, Yuh-Rau Wang, Shi-Jinn Horng, and Tzong-Wann Kao. "Digital Image Watermarking for Malicious Attack." In Algorithms and Architectures for Parallel Processing. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03095-6_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Garg, Hitendra. "Watermarking in Computer Aided Design-Generated 3D Objects." In Algorithms for Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4862-2_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Watermarking algorithms"

1

Zhang, Qingjie, Jianming Zhu, and Xiaoxu Wang. "Monoecism Watermarking Algorithm." In 2012 Fifth International Symposium on Parallel Architectures, Algorithms and Programming (PAAP). IEEE, 2012. http://dx.doi.org/10.1109/paap.2012.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Changjiang, and Min Hu. "Curvelet Image Watermarking Using Genetic Algorithms." In 2008 Congress on Image and Signal Processing. IEEE, 2008. http://dx.doi.org/10.1109/cisp.2008.391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Martinez Villanueva, Jose Alberto, Claudia Feregrino Uribe, and Z. Jezabel Guzman Zavaleta. "Watermarking algorithms analysis on radiological images." In 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE). IEEE, 2008. http://dx.doi.org/10.1109/iceee.2008.4723409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Yi, Kuilong Xia, Yu Fan, and Qiong Li. "Digital Watermarking Algorithms for Vector Images." In 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2008. http://dx.doi.org/10.1109/iih-msp.2008.205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meerwald, Peter, and Andreas Uhl. "Survey of wavelet-domain watermarking algorithms." In Photonics West 2001 - Electronic Imaging, edited by Ping W. Wong and Edward J. Delp III. SPIE, 2001. http://dx.doi.org/10.1117/12.435434.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mawande, Swagata, and Hemlata Dakhore. "Video watermarking using DWT-DCT-SVD algorithms." In 2017 International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2017. http://dx.doi.org/10.1109/iccmc.2017.8282656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xiong, Changzhen, Junyi Xu, and Jiancheng Zou. "Parameters Relation of Quantization-based Watermarking Algorithms." In 2006 IEEE International Symposium on Signal Processing and Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/isspit.2006.270768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qin Jian-ying, Shen Yuan-tong, Ning Yan-bin, and Fu Lei. "Digital watermarking algorithms based on curvelet transform." In 2011 International Conference on Electric Information and Control Engineering (ICEICE). IEEE, 2011. http://dx.doi.org/10.1109/iceice.2011.5777689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumari, Uttara, T. C. Thanuja, J. Vinay, Kavya N. Bhushan, and Naren S. Vasanad. "Watermarking using modulo algorithms for gray images." In 2010 International Conference on Signal and Image Processing (ICSIP). IEEE, 2010. http://dx.doi.org/10.1109/icsip.2010.5697495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Milosav, Predrag, Zoran Banjac, Milan Milosavljević, Tomislav Unkašević, and Medhat Abdelrahman Mohamed Mostafa. "Overview and Classification of Digital Watermarking Algorithms." In Sinteza 2019. Singidunum University, 2019. http://dx.doi.org/10.15308/sinteza-2019-537-545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!