Subjective and objective watermark detection using a novel approach: Bar-coded watermarking
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.author | Han, Song | |
dc.contributor.author | Chang, Elizabeth | |
dc.contributor.author | Wu, Chen | |
dc.date.accessioned | 2017-01-30T11:35:11Z | |
dc.date.available | 2017-01-30T11:35:11Z | |
dc.date.created | 2008-11-12T23:32:20Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Potdar, Vidyasagar and Han, Song and Chang, Elizabeth and Wu, Chen. 2006. Subjective and objective watermark detection using a novel approach: Bar-coded watermarking, in Cheung, Y-M. and Wang, Y. and Liu, H. (ed), International Conference on Computational Intelligence and Security, Nov 03 2006, pp. 1203-1208. Guangzhou, China: IEEE Computer Society Press. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/13145 | |
dc.identifier.doi | 10.1109/ICCIAS.2006.295246 | |
dc.description.abstract |
Many digital watermarking algorithms are proposed in the literature. Broadly these watermarking algorithms can be classified into two main categories. The first category of algorithms uses a pseudo random Gaussian sequence (PRGS) watermark whereas the second category of algorithms uses a binary logo as a watermark. The main advantage of PRGS based watermarking scheme is its ability to detect the presence of watermark without manual intervention. However the main drawback is calculating reliable threshold value. In the similar manner the main advantage of binary logo watermark is that there is no need to calculate threshold value but requires manual intervention to detect the presence of watermark. The advantage and disadvantage of either approach is quite clear hence it would be a good idea to design a watermarking scheme which inherits the advantages from both these approaches. In this paper we present one such approach which is termed as bar-code watermarking. The proposed scheme offers objective as well as subjective detection. A PRGS sequence watermark is represented as a bar-code on a binary logo and embedded in the host image. Watermark detection can be either done subjectively or objectively. | |
dc.publisher | IEEE Computer Society Press | |
dc.subject | PRGS | |
dc.subject | barcode | |
dc.subject | PRGS based watermark | |
dc.subject | security | |
dc.subject | bar-coded | |
dc.subject | binary logo watermark | |
dc.subject | watermark | |
dc.subject | watermark detection | |
dc.subject | detection | |
dc.subject | host image | |
dc.subject | bar code | |
dc.subject | watermarking | |
dc.subject | pseudo random Gaussian sequence | |
dc.title | Subjective and objective watermark detection using a novel approach: Bar-coded watermarking | |
dc.type | Conference Paper | |
dcterms.source.startPage | 1203 | |
dcterms.source.endPage | 1208 | |
dcterms.source.title | 2006 International Conference on Computational Intelligence and Security (CIS), Proceedings - Part 2 | |
dcterms.source.series | 2006 International Conference on Computational Intelligence and Security (CIS), Proceedings - Part 2 | |
dcterms.source.conference | International Conference on Computational Intelligence and Security | |
dcterms.source.conference-start-date | Nov 03 2006 | |
dcterms.source.conferencelocation | Guangzhou, China | |
dcterms.source.place | USA | |
curtin.note |
Copyright 2006 IEEE | |
curtin.note |
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-1274 | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School |