Optimal transform domain watermark embedding via linear programming
Invisible digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyright material. In recent years, it has been recognized that embedding information in a transform domain leads to more robust watermarks. A major difficulty in watermarking in a trans...
Saved in:
Published in | Signal processing Vol. 81; no. 6; pp. 1251 - 1260 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.06.2001
|
Subjects | |
Online Access | Get full text |
ISSN | 0165-1684 1872-7557 |
DOI | 10.1016/S0165-1684(01)00042-1 |
Cover
Abstract | Invisible digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyright material. In recent years, it has been recognized that embedding information in a transform domain leads to more robust watermarks. A major difficulty in watermarking in a transform domain lies in the fact that constraints on the allowable distortion at any pixel may be specified in the spatial domain. The central contribution of the paper is the proposal of an approach which takes into account spatial domain constraints in an optimal fashion. The main idea is to structure the watermark embedding as a linear programming problem in which we wish to maximize the strength of the watermark subject to a set of linear constraints on the pixel distortions as determined by a masking function. We consider the special cases of embedding in the DCT domain and wavelet domain using the Haar wavelet and Daubechies 4-tap filter in conjunction with a masking function based on a non-stationary Gaussian model, but the algorithm is applicable to any combination of transform and masking functions. Our results indicate that the proposed approach performs well against lossy compression such as JPEG and other types of filtering which do not change the geometry of the image. |
---|---|
AbstractList | Invisible digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyright material. In recent years, it has been recognized that embedding information in a transform domain leads to more robust watermarks. A major difficulty in watermarking in a transform domain lies in the fact that constraints on the allowable distortion at any pixel may be specified in the spatial domain. The central contribution of the paper is the proposal of an approach which takes into account spatial domain constraints in an optimal fashion. The main idea is to structure the watermark embedding as a linear programming problem in which we wish to maximize the strength of the watermark subject to a set of linear constraints on the pixel distortions as determined by a masking function. We consider the special cases of embedding in the DCT domain and wavelet domain using the Haar wavelet and Daubechies 4-tap filter in conjunction with a masking function based on a non-stationary Gaussian model, but the algorithm is applicable to any combination of transform and masking functions. Our results indicate that the proposed approach performs well against lossy compression such as JPEG and other types of filtering which do not change the geometry of the image. copyright 2001 Elsevier Science B.V. Invisible digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyright material. In recent years, it has been recognized that embedding information in a transform domain leads to more robust watermarks. A major difficulty in watermarking in a transform domain lies in the fact that constraints on the allowable distortion at any pixel may be specified in the spatial domain. The central contribution of the paper is the proposal of an approach which takes into account spatial domain constraints in an optimal fashion. The main idea is to structure the watermark embedding as a linear programming problem in which we wish to maximize the strength of the watermark subject to a set of linear constraints on the pixel distortions as determined by a masking function. We consider the special cases of embedding in the DCT domain and wavelet domain using the Haar wavelet and Daubechies 4-tap filter in conjunction with a masking function based on a non-stationary Gaussian model, but the algorithm is applicable to any combination of transform and masking functions. Our results indicate that the proposed approach performs well against lossy compression such as JPEG and other types of filtering which do not change the geometry of the image. |
Author | Pereira, S. Voloshynoskiy, S. Pun, T. |
Author_xml | – sequence: 1 givenname: S. surname: Pereira fullname: Pereira, S. email: shelby.pereira@cui.unige.ch – sequence: 2 givenname: S. surname: Voloshynoskiy fullname: Voloshynoskiy, S. email: svolos@cui.unige.ch – sequence: 3 givenname: T. surname: Pun fullname: Pun, T. email: thierry.pun@cui.unige.ch |
BookMark | eNqFkE1LAzEQhoNUsK3-BGFPoofVzG6yH3gQKX5BoQf1HLLJbInuJjXZVvz3plY8eOllBobnnWGeCRlZZ5GQU6CXQKG4eo6Fp1BU7JzCBaWUZSkckDFUZZaWnJcjMv5DjsgkhLcIQV7QMZktVoPpZZcMXtrQOt8n2vXS2ORTDuh76d8T7BvU2thlsjEy6YxF6ZOVd0sv-z6Oj8lhK7uAJ799Sl7v715mj-l88fA0u52ninEY0rbhbV0jZxVnvCjrgteyaQqOrM24phltmASuoc4BSw1VpnJdF61qmMpzrXk-JWe7vfH2xxrDIHoTFHadtOjWQWRFVUFdVhG83oHKuxA8tkKZQQ7G2fil6QRQsRUnfsSJrRVBQfyIExDT_F965aMi_7U3d7PLYXSwMehFUAatQm08qkFoZ_Zs-AaKyoen |
CitedBy_id | crossref_primary_10_1142_S0219477511000612 crossref_primary_10_1109_TIFS_2006_885018 crossref_primary_10_1002_int_22881 crossref_primary_10_1155_2010_509757 crossref_primary_10_1016_j_patrec_2006_04_020 crossref_primary_10_1155_2010_851920 crossref_primary_10_1016_j_jksuci_2020_06_006 crossref_primary_10_1109_TIFS_2006_873652 crossref_primary_10_1155_ASP_2006_86712 crossref_primary_10_1007_s00287_005_0043_y crossref_primary_10_1007_s11042_020_09677_w crossref_primary_10_1049_ip_vis_20045062 crossref_primary_10_1016_j_displa_2024_102637 crossref_primary_10_3745_KIPSTB_2003_10B_5_479 crossref_primary_10_1109_TIP_2011_2146263 crossref_primary_10_1371_journal_pone_0196306 crossref_primary_10_1109_TIP_2008_2008222 crossref_primary_10_1155_2014_241093 crossref_primary_10_1016_j_mejo_2011_01_008 crossref_primary_10_1016_j_jisa_2017_11_008 crossref_primary_10_1587_transfun_E97_A_2107 |
Cites_doi | 10.1109/ICIP.1998.727227 10.1007/10719724_16 10.1117/12.344694 10.1147/sj.353.0313 10.1007/10719724_15 10.1109/5.771072 10.1007/3-540-49380-8_16 10.1109/ICIP.1996.560422 10.1109/49.668976 10.1109/26.539767 10.1109/34.192463 10.1115/96-DETC/DAC-1600 10.1109/ICIP.1998.723521 10.1117/12.344689 10.1109/76.767121 10.1109/DSPWS.1996.555454 10.1016/S0165-1684(00)00205-X 10.1109/ICIP.1996.560429 10.1016/S0165-1684(98)00015-2 10.1109/5.771068 10.1109/49.668975 |
ContentType | Journal Article |
Copyright | 2001 Elsevier Science B.V. |
Copyright_xml | – notice: 2001 Elsevier Science B.V. |
DBID | AAYXX CITATION 7SP 8FD L7M |
DOI | 10.1016/S0165-1684(01)00042-1 |
DatabaseName | CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
DatabaseTitleList | Technology Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1872-7557 |
EndPage | 1260 |
ExternalDocumentID | 10_1016_S0165_1684_01_00042_1 S0165168401000421 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 53G 5VS 7-5 71M 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABFRF ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F0J F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 WUQ XPP ZMT ~02 ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SP 8FD L7M |
ID | FETCH-LOGICAL-c451t-fb5f99e548545679659abb65e4f25d020b4a15d1931e7d182c3d96fcb4c33dd53 |
IEDL.DBID | .~1 |
ISSN | 0165-1684 |
IngestDate | Sun Sep 28 00:18:25 EDT 2025 Wed Oct 01 01:45:16 EDT 2025 Thu Apr 24 23:01:09 EDT 2025 Fri Feb 23 02:26:43 EST 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Keywords | Copyright Wavelet Linear programming DCT Watermark |
Language | English |
License | https://www.elsevier.com/tdm/userlicense/1.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c451t-fb5f99e548545679659abb65e4f25d020b4a15d1931e7d182c3d96fcb4c33dd53 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S0165168401000421 |
PQID | 26881978 |
PQPubID | 23500 |
PageCount | 10 |
ParticipantIDs | proquest_miscellaneous_26881978 crossref_citationtrail_10_1016_S0165_1684_01_00042_1 crossref_primary_10_1016_S0165_1684_01_00042_1 elsevier_sciencedirect_doi_10_1016_S0165_1684_01_00042_1 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2001-06-01 |
PublicationDateYYYYMMDD | 2001-06-01 |
PublicationDate_xml | – month: 06 year: 2001 text: 2001-06-01 day: 01 |
PublicationDecade | 2000 |
PublicationTitle | Signal processing |
PublicationYear | 2001 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | I. Pitas, A method for signature casting on digital images, Proceedings of the IEEE International Conference on Image Processing ICIP-96, Lausanne, Switzerland, September 16–19 1996, pp. 215–218. I. Cox, J. Killian, T. Leighton, T. Shamoon, Secure spread spectrum watermarking for images, audio and video, Proceedings of the IEEE International Conference on Image Processing ICIP-96, Lausanne, Switzerland, 1996, pp. 243–246. G. Voyatzis, I. Pitas, The use of watermarks in the protection of digital multimedia products, Proc. IEEE 87 (July 1999) 1197–1207. W. Bender, D. Gruhl, N. Morimoto, Method and apparatus for data hiding in images, US Patent No. 5689587, 1996. D. Kazmer, P. Barkan, K. Ishii, Quantifying design and manufacturing robustness through stochastic optimization techniques, ASME Design Engineering Technical Conferences and Computers in Engineering Conference, 96-DETC/DAC-1600, Irvine, CA, August 1996. S. Servetto, C. Podilchuk, K. Ramchandran, Capacity issues in digital image watermarking, IEEE International Conference on Image Processing ′98 Proceedings, Focus Interactive Technology Inc., Chicago, Ill, USA, October 1998. W. Osberger, N. Bergmann, A.J. Maeder, An automatic image quality assessment technique incorporating higher level perceptual factors, IEEE ICIP-98, Chicago, USA, October 1998. M. Barni, F. Bartolini, V. Cappellini, A. Piva, F. Rigacci, A M.A.P. identification criterion for DCT-based watermarking, EUSIPCO’98, Rhodes, Greece, September 1998. M. Kutter, S. Voloshynovskiy, A. Herrigel, Watermark copy attack, in: P. Wah Wong, E.J. Delp (Eds.), IS&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, SPIE Proceedings, San Jose, CA, USA, Vol. 3971, 23–28 January 2000. Zhu, Xiong, Zhang (BIB24) June 1999; 9 Cox, Miller, McKellips (BIB7) July 1999; 87 S. Voloshynovskiy, F. Deguillaume, T. Pun, Content adaptive watermarking based on a stochastic multiresolution image modeling, EUSIPCO 2000, Tampere, Finland, submitted 2000. S. Pereira, T. Pun, A framework for optimal adaptive dct watermarks using linear programming, Proceedings of the Tenth European Signal Processing Conference, EUSIPCO’2000, Tampere, Finland, September 5–8 2000. M. Barni, F. Bartolini, V. Cappellini, A. Lippi, A. Piva, A DWT-based technique for spatio-frequency masking of digital signatures, in: P.W. Wong, E.J. Delp (Eds.), Security and Watermarking of Multimedia Contents, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE, San Jose, California, USA, 25–27 January 1999, Vol. 3657, pp. 31–39. Podilchuk, Zeng (BIB17) May 1998; 16 M.D. Swanson, B. Zhu, A. Tewfik, Robust data hiding for images, Proceedings of the Seventh IEEE Digital Signal Processing Workshop, Loen, Norway, September 1996, G:WM1-A23, pp. 37–40. C. Berrou, A. Glavieux, Near optimum error correcting coding and decoding: turbo-codes, IEEE Trans. Commun. 44 (October 1996) 1261–1271. F.A.P. Petitcolas, R.J. Anderson, Attacks on copyright marking systems, Proceedings of the Second International Information Hiding Workshop, Portland, Oregon, USA, (April 1998), pp. 219–239. S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, T. Pun, A stochastic approach to content adaptive digital image watermarking, Third International Workshop on Information Hiding, Dresden, Germany, September 29–October 1st 1999. Swanson, Zhu, Tewfik (BIB20) May 1998; 16 S. Pereira, T. Pun, Fast robust template matching for affine resistant watermarks, Proceedings of the Third International Information Hiding Workshop, Dreseden, Germany, September 1999. M. Barni, F. Bartolini, A.D. Rosa, A. Piva, Capacity of the watermark-channel: How many bits can be hidden within a digital image?, in: D. Aucsmith (Ed.), SPIE: Security and Watermarking of Multimedia Contents, Vol. 3657, San Jose, California, January 1999, pp. 437–448. J.J. Eggers, B. Girod, Quantization effects on digital watermarks, Signal Process. submitted 2000. Mallat (BIB11) 1989; 11 10.1016/S0165-1684(01)00042-1_BIB1 10.1016/S0165-1684(01)00042-1_BIB2 10.1016/S0165-1684(01)00042-1_BIB5 10.1016/S0165-1684(01)00042-1_BIB6 Podilchuk (10.1016/S0165-1684(01)00042-1_BIB17) 1998; 16 10.1016/S0165-1684(01)00042-1_BIB3 10.1016/S0165-1684(01)00042-1_BIB4 Mallat (10.1016/S0165-1684(01)00042-1_BIB11) 1989; 11 10.1016/S0165-1684(01)00042-1_BIB15 10.1016/S0165-1684(01)00042-1_BIB14 Zhu (10.1016/S0165-1684(01)00042-1_BIB24) 1999; 9 10.1016/S0165-1684(01)00042-1_BIB13 Cox (10.1016/S0165-1684(01)00042-1_BIB7) 1999; 87 10.1016/S0165-1684(01)00042-1_BIB12 10.1016/S0165-1684(01)00042-1_BIB23 10.1016/S0165-1684(01)00042-1_BIB19 10.1016/S0165-1684(01)00042-1_BIB18 10.1016/S0165-1684(01)00042-1_BIB16 Swanson (10.1016/S0165-1684(01)00042-1_BIB20) 1998; 16 10.1016/S0165-1684(01)00042-1_BIB9 10.1016/S0165-1684(01)00042-1_BIB8 10.1016/S0165-1684(01)00042-1_BIB22 10.1016/S0165-1684(01)00042-1_BIB10 10.1016/S0165-1684(01)00042-1_BIB21 |
References_xml | – volume: 9 start-page: 545 year: June 1999 end-page: 550 ident: BIB24 article-title: Multiresolution watermarking for images and video publication-title: IEEE Trans. Circuits Systems Video Technol. – reference: M. Barni, F. Bartolini, V. Cappellini, A. Lippi, A. Piva, A DWT-based technique for spatio-frequency masking of digital signatures, in: P.W. Wong, E.J. Delp (Eds.), Security and Watermarking of Multimedia Contents, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE, San Jose, California, USA, 25–27 January 1999, Vol. 3657, pp. 31–39. – reference: D. Kazmer, P. Barkan, K. Ishii, Quantifying design and manufacturing robustness through stochastic optimization techniques, ASME Design Engineering Technical Conferences and Computers in Engineering Conference, 96-DETC/DAC-1600, Irvine, CA, August 1996. – reference: W. Osberger, N. Bergmann, A.J. Maeder, An automatic image quality assessment technique incorporating higher level perceptual factors, IEEE ICIP-98, Chicago, USA, October 1998. – reference: M. Barni, F. Bartolini, V. Cappellini, A. Piva, F. Rigacci, A M.A.P. identification criterion for DCT-based watermarking, EUSIPCO’98, Rhodes, Greece, September 1998. – reference: G. Voyatzis, I. Pitas, The use of watermarks in the protection of digital multimedia products, Proc. IEEE 87 (July 1999) 1197–1207. – reference: S. Pereira, T. Pun, Fast robust template matching for affine resistant watermarks, Proceedings of the Third International Information Hiding Workshop, Dreseden, Germany, September 1999. – volume: 16 start-page: 540 year: May 1998 end-page: 550 ident: BIB20 article-title: Multiresolution scene-based video watermarking using perceptual models publication-title: IEEE J. Select. Areas Commun. – reference: M. Barni, F. Bartolini, A.D. Rosa, A. Piva, Capacity of the watermark-channel: How many bits can be hidden within a digital image?, in: D. Aucsmith (Ed.), SPIE: Security and Watermarking of Multimedia Contents, Vol. 3657, San Jose, California, January 1999, pp. 437–448. – reference: I. Cox, J. Killian, T. Leighton, T. Shamoon, Secure spread spectrum watermarking for images, audio and video, Proceedings of the IEEE International Conference on Image Processing ICIP-96, Lausanne, Switzerland, 1996, pp. 243–246. – volume: 11 start-page: 674 year: 1989 end-page: 693 ident: BIB11 article-title: A theory for multiresolution signal decomposition: the wavelet representation publication-title: IEEE Trans. PAMI – volume: 16 start-page: 525 year: May 1998 end-page: 539 ident: BIB17 article-title: Image-adaptive watermarking using visual models publication-title: IEEE J. Select. Areas Commun. – reference: C. Berrou, A. Glavieux, Near optimum error correcting coding and decoding: turbo-codes, IEEE Trans. Commun. 44 (October 1996) 1261–1271. – reference: M. Kutter, S. Voloshynovskiy, A. Herrigel, Watermark copy attack, in: P. Wah Wong, E.J. Delp (Eds.), IS&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, SPIE Proceedings, San Jose, CA, USA, Vol. 3971, 23–28 January 2000. – reference: S. Voloshynovskiy, F. Deguillaume, T. Pun, Content adaptive watermarking based on a stochastic multiresolution image modeling, EUSIPCO 2000, Tampere, Finland, submitted 2000. – reference: M.D. Swanson, B. Zhu, A. Tewfik, Robust data hiding for images, Proceedings of the Seventh IEEE Digital Signal Processing Workshop, Loen, Norway, September 1996, G:WM1-A23, pp. 37–40. – reference: F.A.P. Petitcolas, R.J. Anderson, Attacks on copyright marking systems, Proceedings of the Second International Information Hiding Workshop, Portland, Oregon, USA, (April 1998), pp. 219–239. – volume: 87 start-page: 1127 year: July 1999 end-page: 1141 ident: BIB7 article-title: Watermarking as communications with side information publication-title: Proc. IEEE – reference: S. Pereira, T. Pun, A framework for optimal adaptive dct watermarks using linear programming, Proceedings of the Tenth European Signal Processing Conference, EUSIPCO’2000, Tampere, Finland, September 5–8 2000. – reference: W. Bender, D. Gruhl, N. Morimoto, Method and apparatus for data hiding in images, US Patent No. 5689587, 1996. – reference: S. Servetto, C. Podilchuk, K. Ramchandran, Capacity issues in digital image watermarking, IEEE International Conference on Image Processing ′98 Proceedings, Focus Interactive Technology Inc., Chicago, Ill, USA, October 1998. – reference: S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, T. Pun, A stochastic approach to content adaptive digital image watermarking, Third International Workshop on Information Hiding, Dresden, Germany, September 29–October 1st 1999. – reference: J.J. Eggers, B. Girod, Quantization effects on digital watermarks, Signal Process. submitted 2000. – reference: I. Pitas, A method for signature casting on digital images, Proceedings of the IEEE International Conference on Image Processing ICIP-96, Lausanne, Switzerland, September 16–19 1996, pp. 215–218. – ident: 10.1016/S0165-1684(01)00042-1_BIB12 doi: 10.1109/ICIP.1998.727227 – ident: 10.1016/S0165-1684(01)00042-1_BIB22 doi: 10.1007/10719724_16 – ident: 10.1016/S0165-1684(01)00042-1_BIB2 doi: 10.1117/12.344694 – ident: 10.1016/S0165-1684(01)00042-1_BIB4 doi: 10.1147/sj.353.0313 – ident: 10.1016/S0165-1684(01)00042-1_BIB10 – ident: 10.1016/S0165-1684(01)00042-1_BIB13 doi: 10.1007/10719724_15 – ident: 10.1016/S0165-1684(01)00042-1_BIB23 doi: 10.1109/5.771072 – ident: 10.1016/S0165-1684(01)00042-1_BIB14 – ident: 10.1016/S0165-1684(01)00042-1_BIB15 doi: 10.1007/3-540-49380-8_16 – ident: 10.1016/S0165-1684(01)00042-1_BIB16 doi: 10.1109/ICIP.1996.560422 – volume: 16 start-page: 540 year: 1998 ident: 10.1016/S0165-1684(01)00042-1_BIB20 article-title: Multiresolution scene-based video watermarking using perceptual models publication-title: IEEE J. Select. Areas Commun. doi: 10.1109/49.668976 – ident: 10.1016/S0165-1684(01)00042-1_BIB5 doi: 10.1109/26.539767 – volume: 11 start-page: 674 year: 1989 ident: 10.1016/S0165-1684(01)00042-1_BIB11 article-title: A theory for multiresolution signal decomposition: the wavelet representation publication-title: IEEE Trans. PAMI doi: 10.1109/34.192463 – ident: 10.1016/S0165-1684(01)00042-1_BIB9 doi: 10.1115/96-DETC/DAC-1600 – ident: 10.1016/S0165-1684(01)00042-1_BIB18 doi: 10.1109/ICIP.1998.723521 – ident: 10.1016/S0165-1684(01)00042-1_BIB3 doi: 10.1117/12.344689 – ident: 10.1016/S0165-1684(01)00042-1_BIB21 – volume: 9 start-page: 545 year: 1999 ident: 10.1016/S0165-1684(01)00042-1_BIB24 article-title: Multiresolution watermarking for images and video publication-title: IEEE Trans. Circuits Systems Video Technol. doi: 10.1109/76.767121 – ident: 10.1016/S0165-1684(01)00042-1_BIB19 doi: 10.1109/DSPWS.1996.555454 – ident: 10.1016/S0165-1684(01)00042-1_BIB8 doi: 10.1016/S0165-1684(00)00205-X – ident: 10.1016/S0165-1684(01)00042-1_BIB6 doi: 10.1109/ICIP.1996.560429 – ident: 10.1016/S0165-1684(01)00042-1_BIB1 doi: 10.1016/S0165-1684(98)00015-2 – volume: 87 start-page: 1127 year: 1999 ident: 10.1016/S0165-1684(01)00042-1_BIB7 article-title: Watermarking as communications with side information publication-title: Proc. IEEE doi: 10.1109/5.771068 – volume: 16 start-page: 525 year: 1998 ident: 10.1016/S0165-1684(01)00042-1_BIB17 article-title: Image-adaptive watermarking using visual models publication-title: IEEE J. Select. Areas Commun. doi: 10.1109/49.668975 |
SSID | ssj0001360 |
Score | 1.9240714 |
Snippet | Invisible digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyright material. In recent years, it has... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1251 |
SubjectTerms | Copyright DCT Linear programming Watermark Wavelet |
Title | Optimal transform domain watermark embedding via linear programming |
URI | https://dx.doi.org/10.1016/S0165-1684(01)00042-1 https://www.proquest.com/docview/26881978 |
Volume | 81 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVESC databaseName: Freedom Collection Journals customDbUrl: eissn: 1872-7557 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001360 issn: 0165-1684 databaseCode: AIKHN dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Science Direct customDbUrl: eissn: 1872-7557 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001360 issn: 0165-1684 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect customDbUrl: eissn: 1872-7557 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001360 issn: 0165-1684 databaseCode: ACRLP dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1872-7557 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001360 issn: 0165-1684 databaseCode: AKRWK dateStart: 19930101 isFulltext: true providerName: Library Specific Holdings |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDI6mcYED4inGY_TAAQ7ZmiVp0-M0MQ0Q4wCTdovyqjRBu2lscOO3k6QtDCQ0iatlR5Hr2J9T2wHgQqkwTE1CYWqETVAEw1CkOIGJUAnRTIdYuebk-2E0GJHbMR3XQK_qhXFllaXvL3y699YlpV1qsz2bTNqPrhEHuVkl7oqa-GZyN_3L2nTr47vMA2HfKeyYoeP-7uIpVvDEyxBd-UUg-is-_fLUPvz0d8B2iRuDbrG1XVAz-R7YWpkmuA96D_b4Z5ZpUYHRQE8zm_kH78I74PlzYDJptAtXwdtEBA5iinlQ1mhllnwARv3rp94Alm8kQEUoWsBU0jRJjM07HBSK3XhAIWVEDUk7VFssKIlAVFuYhkysbTKhsE6iVEmiMNaa4kNQz6e5OQIBTeOY0ohESEaECcSYIsoSdcxCjZRoAFJphqtygLh7x-KFr1SKRZQ7hfIQca9Qjhqg9SU2KyZorBNgldr5D1Pg1suvEz2vPhO3x8T9-xC5mS5feSdiFvvE7Pj_i5-AzaIAzV3BnIL6Yr40ZxaRLGTTm1wTbHRv7gbDTzDN2aE |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqdgAGxFOUVz0wwBAaN3bijFVFVeiDgVbqZjl-SBUkrUoKfx87j1KQUCXWk-8UXZzvvnPuzgDcCOG6WoXE0YqbBIVTz-HaC52QixBLKl1P2Obk4cjvTfDTlEwroFP2wtiyygL7c0zP0LqQNAtvNhezWfPFNuIgO6vEHlFj20xew8RgchXU2o_93mgNyMjLmoXtescqfDfy5EYy4a2L7jI7DvorRP0C6ywCdQ_AfkEdYTt_ukNQUckR2NsYKHgMOs8GAWKzKC35KJTz2CT_8JNnGLx8hSqOlLQRC37MOLQsky9hUaYVG_EJmHQfxp2eU1yT4AhMUOroiOgwVCb1sGwosBMCeRT5RGHdItLQwQhzRKRhakgF0uQTwpOhr0WEhedJSbxTUE3miToDkOggIMTHPop8TDmiVGBhhDKgrkSC1wEuPcNEMUPcXmXxxjaKxXzCrEOZi1jmUIbq4H6ttsiHaGxToKXb2Y_dwAzQb1NtlK-JmS_F_v7giZqv3lnLp4b-BPT8_8YbYKc3Hg7Y4HHUvwC7eT2aPZG5BNV0uVJXhqCk0XWxAb8AtIzcTA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optimal+transform+domain+watermark+embedding+via+linear+programming&rft.jtitle=Signal+processing&rft.au=Pereira%2C+S.&rft.au=Voloshynoskiy%2C+S.&rft.au=Pun%2C+T.&rft.date=2001-06-01&rft.pub=Elsevier+B.V&rft.issn=0165-1684&rft.eissn=1872-7557&rft.volume=81&rft.issue=6&rft.spage=1251&rft.epage=1260&rft_id=info:doi/10.1016%2FS0165-1684%2801%2900042-1&rft.externalDocID=S0165168401000421 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0165-1684&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0165-1684&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0165-1684&client=summon |