An improved asymmetric watermarking scheme suitable for copy protection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An improved hybrid image watermarking scheme in shearlet and wavelet domain

Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...

متن کامل

An Improved and Improvised Wavelet Watermarking Scheme

This paper will discuss the modification and improvisation of two different wavelet watermarking techniques: Tree Quantization and Pixel-Wise Masking. Both techniques use Discrete Wavelet Transforms (DWT) of four levels to embed their watermarks in completely different methods. These methods have been modified from their original descriptions to assist in our use and testing. The watermark itse...

متن کامل

An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions

Traceability schemes (also known as traitor tracing schemes) have been proposed as a method to establish copyright protection of broadcast information. With asymmetric traceability, the merchant cannot frame an innocent user, while no user can abuse the system without being detected. We propose an asymmetric solution for traceability, based on a very efficient symmetric scheme [4]. We do not ma...

متن کامل

An asymmetric image watermarking scheme resistant against geometrical distortions

In this paper, a novel asymmetric public-key watermarking scheme is proposed. The watermark is embedded with the use of a private key, while the decoding uses only simple public key. The asymmetric watermark carries certain number of bits of information. However, neither the knowledge of a public key, nor the knowledge of the hidden information, does not allow the attacker to remove the waterma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Signal Processing

سال: 2006

ISSN: 1053-587X

DOI: 10.1109/tsp.2006.874411