Show simple item record

dc.contributor.authorPotdar, Vidyasagar
dc.contributor.authorHan, Song
dc.contributor.authorChang, Elizabeth
dc.contributor.authorWu, Chen
dc.identifier.citationPotdar, Vidyasagar and Han, Song and Chang, Elizabeth and Wu, Chen. 2006. Subjective and objective watermark detection using a novel approach: Bar-coded watermarking, in Cheung, Y-M. and Wang, Y. and Liu, H. (ed), International Conference on Computational Intelligence and Security, Nov 03 2006, pp. 1203-1208. Guangzhou, China: IEEE Computer Society Press.

Many digital watermarking algorithms are proposed in the literature. Broadly these watermarking algorithms can be classified into two main categories. The first category of algorithms uses a pseudo random Gaussian sequence (PRGS) watermark whereas the second category of algorithms uses a binary logo as a watermark. The main advantage of PRGS based watermarking scheme is its ability to detect the presence of watermark without manual intervention. However the main drawback is calculating reliable threshold value. In the similar manner the main advantage of binary logo watermark is that there is no need to calculate threshold value but requires manual intervention to detect the presence of watermark. The advantage and disadvantage of either approach is quite clear hence it would be a good idea to design a watermarking scheme which inherits the advantages from both these approaches. In this paper we present one such approach which is termed as bar-code watermarking. The proposed scheme offers objective as well as subjective detection. A PRGS sequence watermark is represented as a bar-code on a binary logo and embedded in the host image. Watermark detection can be either done subjectively or objectively.

dc.publisherIEEE Computer Society Press
dc.subjectPRGS based watermark
dc.subjectbinary logo watermark
dc.subjectwatermark detection
dc.subjecthost image
dc.subjectbar code
dc.subjectpseudo random Gaussian sequence
dc.titleSubjective and objective watermark detection using a novel approach: Bar-coded watermarking
dc.typeConference Paper
dcterms.source.title2006 International Conference on Computational Intelligence and Security (CIS), Proceedings - Part 2
dcterms.source.series2006 International Conference on Computational Intelligence and Security (CIS), Proceedings - Part 2
dcterms.source.conferenceInternational Conference on Computational Intelligence and Security
dcterms.source.conference-start-dateNov 03 2006
dcterms.source.conferencelocationGuangzhou, China

Copyright 2006 IEEE


This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.accessStatusOpen access
curtin.facultyCurtin Business School

Files in this item


This item appears in the following Collection(s)

Show simple item record