Learn More
The important criteria used in subjective evaluation of distorted images include the amount of distortion, the type of distortion, and the distribution of error. An ideal image quality measure should, therefore, be able to mimic the human observer. We present a new grayscale image quality measure that can be used as a graphical or a scalar measure to(More)
Both Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) have been used as mathematical tools for embedding data into an image. In this paper, we present a new robust hybrid watermarking scheme based on DCT and SVD. After applying the DCT to the cover image, we map the DCT coefficients in a zigzag order into four quadrants, and apply the(More)
Robustness of an image watermarking scheme is the ability to detect the watermark after intentional attacks and normal audio/visual processes. A DWT image watermarking paper embeds a PRN sequence as a watermark in three bands, excluding the low pass subband, using coefficients that are higher than a given threshold T 1. During watermark detection, all the(More)
1 Summary of the review The book is a collection of 14 excellent articles on techniques of multimedia watermarking and their applications. It includes survey articles that describe the state-of-the art in multimedia watermarking techniques as well as articles that introduce new techniques that improve over the weaknesses of the existing ones and new(More)
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology to achieve copyright protection, the relevant literature includes several distinct approaches for embedding data into a multimedia element (primarily images, audio, and video).(More)
While lossy image compression techniques are vital in reducing bandwidth and storage requirements, they result in distortions in compressed images. A reliable quality measure is a much needed tool for determining the type and amount of image distortion. The traditional subjective criteria, which involve human observers, are inconvenient, time-consuming, and(More)
Security is an increasingly important attribute for multimedia applications that require prevention of unauthorized access to copyrighted data. Two approaches have been used to protect scalable video content in distribution: Partial encryption and progressive encryption. Partial encryption provides protection for only selected portions of the video.(More)