A novel semi-private watermarking technique

被引:0
|
作者
Wong, PHW [1 ]
Au, OC [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Elect & Elect Engn, Kowloon, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A novel watermarking technique is proposed to embed a semi-watermark in digital images. Before embedding the watermark, a M-dimensional vector is extracted from the original data. Watermarking is achieved by modifying this vector to another particular vector according to the private keys and the watermark. A dual-key system is used to reduce the chance for the removal of watermark. The watermark can be detected without the original image. If the original image is available in the detection of watermark, the proposed technique is almost equivalent to the well known spread spectrum technique.
引用
收藏
页码:623 / 626
页数:4
相关论文
共 50 条
  • [1] A novel semi-private watermarking technique
    Wong, PHW
    Au, OC
    2002 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II, PROCEEDINGS, 2002, : 448 - 451
  • [2] 'SEMI-PRIVATE'
    DICKEY, W
    POETRY, 1995, 166 (03) : 145 - 145
  • [3] SEMI-PRIVATE ROOM
    BOULANGER, WJ
    WISCONSIN MEDICAL JOURNAL, 1980, 79 (01): : 7 - 7
  • [4] SEMI-PRIVATE LESSON
    LESSIN, J
    CLAVIER, 1985, 24 (04): : 44 - 46
  • [5] THE SEMI-PRIVATE FOUNDATION
    COWLEY, JM
    CASE, LO
    TAXES-THE TAX MAGAZINE, 1981, 59 (01): : 53 - 56
  • [6] SEMI-PRIVATE AND SEMI-PUBLIC
    KIRSTEIN, T
    NORDISK PSYKOLOGI, 1976, 28 (02): : 72 - 81
  • [7] SEMI-PRIVATE ROOM - SEMI-BARBARIC
    NEUMANN, HH
    CONNECTICUT MEDICINE, 1974, 38 (03) : 133 - &
  • [8] Adaptive Semi-Private Email Aliases
    Ng, Beng Heng
    Crowell, Alexander
    Prakash, Atul
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [9] NO USER FEES FOR CANADA SEMI-PRIVATE CLINICS
    KONDRO, W
    LANCET, 1995, 345 (8943): : 185 - 185
  • [10] Practical Secure Evaluation of Semi-private Functions
    Paus, Annika
    Sadeghi, Ahmad-Reza
    Schneider, Thomas
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 89 - 106