Results 1 - 10
of
4,591
Table 1 - Number of publication on digital watermarking, INSPEC January 99
2004
"... In PAGE 11: ... There is thus an increasing interest in information hiding, such as steganography, covert channels, watermarking, anonymity and so on, as they have been considered one of the most sophisticated and advanced techniques for attacking systems, networks, and so on, and can be used for passing information without being it detected. The increasing interest can be seen in Table1 - Number of publication on digital watermarking, INSPEC January 99. No recent information can be found on this, but it can be seen that there has been a large number of publications in the past few years.... ..."
Table II shows the detection results from several JPEG-compressed versions of the watermarked Lena image with compression ratios of 2.5:1, 3.3:1, 5:1, 10:1, 12.5:1, 25:1, and 50:1. The correlations between the compressed watermarked image and the digital watermarking code across the level 2 and level 3 are compared with the two thresholds computed during the watermark embedding procedure. The two conditions specified in the watermark detection procedure are used to detect the presence of the watermark.
Table 1: Watermarking Attacks
"... In PAGE 3: ... This is because there are many diverse attacks that can be used to reduce the detectability of the watermark. Table1 lists the most common attacks usedagainstwatermarking schemes. The first three attacks are used to remove the watermark, while the fourth attack is used to recover the secret key used in the watermarking.... In PAGE 3: ... The first three attacks are used to remove the watermark, while the fourth attack is used to recover the secret key used in the watermarking. As Table1 shows,the typesof attacksare diverse. Thefirst attack, described as digital filtering, actually covers many attacks that can be described by simple mathematical filters, such as time-scaling, pitch-shifting, cropping, mixing sources, and editing.... ..."
Cited by 1
TABLE I Early robustness tests (August 1998) for various digital watermarking products. Values are percentage of survival to attack. For each product 5 test images (baboon, benz, girl, glasses, and lena) have been used and for each image 42 transformations have been applied using StirMark 2. Each image has been watermarked using the best parameters that do not give obvious and annoying distortions. Although comparison should be done with great care (not all systems have the same applications, some systems are public other semi-private, etc.), the table confirms what is currently achieved and what needs further research.
1999
Cited by 26
Table 1: Nine representative electronic commerce web sites with their digital media data types and their digital contents.
2004
"... In PAGE 5: ... However, these web sites may not currently use digital watermarking for protection. The locations of the web site together with the media data types and types of associated digital contents are listed in Table1 . There are four basic data types of digital contents in these electronic commerce sites, namely image, video, audio and text.... In PAGE 6: ... For example, a watermark is perceptible and robust if it follows the left-most path, indicated by the thick arrow in Figure 3. We studied nine typical electronic commerce web sites listed in Table1 to investigate the relationship between watermark design pattern and media data. The focus of this paper is on copyright protection.... ..."
Cited by 1
Table 1: Research Issues of Watermarking Protocols
2004
"... In PAGE 3: ... The dispute resolution concerns the resolution of digital rights upon the detection of suspected copies. In connection to these three major processes, latest researches on watermarking protocol generally address the six issues as tabulated in Table1 . Regarding the issues (b) to (f), different work makes different assumptions on the degree of trusts.... In PAGE 3: ...e., the issue (c) in Table1 . Qiao and Nahrstedt [19] suggested two ways to tackle the problem.... In PAGE 4: ... If the public authority cannot be trusted, problems will arise as a watermark can be removed easily when it is known. To address the issue (f) in Table1 , Gopalakrishnan et al. [8] suggested a protocol that does not need to reveal watermarks to a public authority in the dispute resolution phase.... ..."
Cited by 3
Table 1 Bit error rate of the watermark at different rounding off error settings
"... In PAGE 8: ... However, there is a limit of the bit length per one wavelet coefficient vector for embedding watermark, because the digit width of the vertex coordinate is finite. Table1 shows the result of bit error rate of the watermark at different rounding off error settings. The results show that increasing the size of bit length k cause a larger bit error rate.... ..."
Table 8 Experimental results compared to Ref.[7] and two commercial watermark techniques Attack Results in Ref.[7] Digimarc technique Suresign technique The method proposed this paper Scaling 0.78 0.72 0.95 1 Rotation 1 0.94 0.5 Flipping
"... In PAGE 10: ...2 NC comparison (scaling and rotation) We compare the experimental results of the method proposed in this paper to those of Ref.[7], which proposed a digital watermarking technique in DFT domain and some commercial watermark techniques and Table8 shows the results. The method proposed in this paper can be realized in any domain, including DWT, DCT, DFT and ... ..."
Table 1. The averages of detected watermark strengths (Mean) and the rates (CDR) by which the correct 64-bit message was detected.
"... In PAGE 9: ... The mixed analogue signal was converted to a digital signal using a sound card in a notebook PC to detect the watermark. The Analogue Watermarking row of Table1 shows the average of the detected watermark strengths and the correct detection rate for the message. 6.... In PAGE 10: ... When real-time watermark generation is in progress, the stored power spectrums of the background noise are added to the power spectrums of the host signal for calculation of the frequency masking. The result of the experiment is shown in the Sonic Watermarking with Sampling row of Table1 . It can be seen that the correct detection rates for the solos and the orchestras were improved.... ..."
Cited by 1
Results 1 - 10
of
4,591