• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,591
Next 10 →

Table 1 - Number of publication on digital watermarking, INSPEC January 99

in AUTHORSHIP DECLARATION........................................................................................................4 ABSTRACT.......................................................................................................................
by David Llamas, Supervisor Dr. William Buchanan, David Llamas, List Of Figures 2004
"... In PAGE 11: ... There is thus an increasing interest in information hiding, such as steganography, covert channels, watermarking, anonymity and so on, as they have been considered one of the most sophisticated and advanced techniques for attacking systems, networks, and so on, and can be used for passing information without being it detected. The increasing interest can be seen in Table1 - Number of publication on digital watermarking, INSPEC January 99. No recent information can be found on this, but it can be seen that there has been a large number of publications in the past few years.... ..."

Table 1 Different color channels used in embedding the digital watermarks.

in Background
by unknown authors

Table II shows the detection results from several JPEG-compressed versions of the watermarked Lena image with compression ratios of 2.5:1, 3.3:1, 5:1, 10:1, 12.5:1, 25:1, and 50:1. The correlations between the compressed watermarked image and the digital watermarking code across the level 2 and level 3 are compared with the two thresholds computed during the watermark embedding procedure. The two conditions specified in the watermark detection procedure are used to detect the presence of the watermark.

in An Efficient Wavelet-Based Watermarking Algorithm
by Xiaojun Qi

Table 1: Watermarking Attacks

in Digital Music Distribution and Audio Watermarking
by Steve Czerwinski, Richard Fromm, Todd Hodes
"... In PAGE 3: ... This is because there are many diverse attacks that can be used to reduce the detectability of the watermark. Table1 lists the most common attacks usedagainstwatermarking schemes. The first three attacks are used to remove the watermark, while the fourth attack is used to recover the secret key used in the watermarking.... In PAGE 3: ... The first three attacks are used to remove the watermark, while the fourth attack is used to recover the secret key used in the watermarking. As Table1 shows,the typesof attacksare diverse. Thefirst attack, described as digital filtering, actually covers many attacks that can be described by simple mathematical filters, such as time-scaling, pitch-shifting, cropping, mixing sources, and editing.... ..."
Cited by 1

TABLE I Early robustness tests (August 1998) for various digital watermarking products. Values are percentage of survival to attack. For each product 5 test images (baboon, benz, girl, glasses, and lena) have been used and for each image 42 transformations have been applied using StirMark 2. Each image has been watermarked using the best parameters that do not give obvious and annoying distortions. Although comparison should be done with great care (not all systems have the same applications, some systems are public other semi-private, etc.), the table confirms what is currently achieved and what needs further research.

in Fabien A. P. Petitcolas and Ross J. Anderson
by De Rs On, Fabien A. P. Petitcolas, Ross J. Anderson 1999
Cited by 26

Table 1: Nine representative electronic commerce web sites with their digital media data types and their digital contents.

in Intellectual Property Protection for Electronic Commerce Applications
by S. H. Kwok, C. C. Yang, K. Y. Tam 2004
"... In PAGE 5: ... However, these web sites may not currently use digital watermarking for protection. The locations of the web site together with the media data types and types of associated digital contents are listed in Table1 . There are four basic data types of digital contents in these electronic commerce sites, namely image, video, audio and text.... In PAGE 6: ... For example, a watermark is perceptible and robust if it follows the left-most path, indicated by the thick arrow in Figure 3. We studied nine typical electronic commerce web sites listed in Table1 to investigate the relationship between watermark design pattern and media data. The focus of this paper is on copyright protection.... ..."
Cited by 1

Table 1: Research Issues of Watermarking Protocols

in A commutative encrypted protocol for the privacy protection of watermarks in digital contents
by Shing-chi Cheung, Ho-fung Leung, Changjie Wang 2004
"... In PAGE 3: ... The dispute resolution concerns the resolution of digital rights upon the detection of suspected copies. In connection to these three major processes, latest researches on watermarking protocol generally address the six issues as tabulated in Table1 . Regarding the issues (b) to (f), different work makes different assumptions on the degree of trusts.... In PAGE 3: ...e., the issue (c) in Table1 . Qiao and Nahrstedt [19] suggested two ways to tackle the problem.... In PAGE 4: ... If the public authority cannot be trusted, problems will arise as a watermark can be removed easily when it is known. To address the issue (f) in Table1 , Gopalakrishnan et al. [8] suggested a protocol that does not need to reveal watermarks to a public authority in the dispute resolution phase.... ..."
Cited by 3

Table 1 Bit error rate of the watermark at different rounding off error settings

in DIGITAL WATERMARKING FOR 3D POLYGONAL MODEL BASED ON WAVELET TRANSFORM
by unknown authors
"... In PAGE 8: ... However, there is a limit of the bit length per one wavelet coefficient vector for embedding watermark, because the digit width of the vertex coordinate is finite. Table1 shows the result of bit error rate of the watermark at different rounding off error settings. The results show that increasing the size of bit length k cause a larger bit error rate.... ..."

Table 8 Experimental results compared to Ref.[7] and two commercial watermark techniques Attack Results in Ref.[7] Digimarc technique Suresign technique The method proposed this paper Scaling 0.78 0.72 0.95 1 Rotation 1 0.94 0.5 Flipping

in Geometric Distortions Invariant Blind Second Generation Watermarking Technique Based on Tchebichef Moment of Original Image
by Zhang Li, Qian Gong-bin, Xiao Wei-wei
"... In PAGE 10: ...2 NC comparison (scaling and rotation) We compare the experimental results of the method proposed in this paper to those of Ref.[7], which proposed a digital watermarking technique in DFT domain and some commercial watermark techniques and Table8 shows the results. The method proposed in this paper can be realized in any domain, including DWT, DCT, DFT and ... ..."

Table 1. The averages of detected watermark strengths (Mean) and the rates (CDR) by which the correct 64-bit message was detected.

in Audio Watermarking for Live Performance
by Ryuki Tachibana
"... In PAGE 9: ... The mixed analogue signal was converted to a digital signal using a sound card in a notebook PC to detect the watermark. The Analogue Watermarking row of Table1 shows the average of the detected watermark strengths and the correct detection rate for the message. 6.... In PAGE 10: ... When real-time watermark generation is in progress, the stored power spectrums of the background noise are added to the power spectrums of the host signal for calculation of the frequency masking. The result of the experiment is shown in the Sonic Watermarking with Sampling row of Table1 . It can be seen that the correct detection rates for the solos and the orchestras were improved.... ..."
Cited by 1
Next 10 →
Results 1 - 10 of 4,591
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University