Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,999,109 papers from all fields of science
Search
Sign In
Create Free Account
Watermark (data file)
Known as:
Watermark (disambiguation)
A watermark stored in a data file refers to a method for ensuring data integrity which combines aspects of data hashing and digital watermarking…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Cryptoloop
Data integrity
Digital Watermarking Alliance
Digital image
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform
S. A. Mostafa
,
A. S. Tolba
,
F. M. Abdelkader
,
H. M. Elhindy
2009
Corpus ID: 16450978
††† † † Summary This paper presents a novel technique for embedding a binary logo watermark into video frames. The proposed…
Expand
Highly Cited
2009
Highly Cited
2009
Reversible blind watermarking for medical images based on wavelet histogram shifting
H. Golpîra
,
H. Danyali
IEEE International Symposium on Signal Processing…
2009
Corpus ID: 10512309
This paper proposes a blind reversible watermarking approach for medical images based on histogram shifting in wavelet domain. An…
Expand
2007
2007
A Feature-Based Digital Image Watermarking for Copyright Protection and Content Authentication
Jen-Sheng Tsai
,
Win-bin Huang
,
Chao-Lieh Chen
,
Y. Kuo
IEEE International Conference on Image Processing
2007
Corpus ID: 7877541
In this paper, a feature-based robust digital image watermarking algorithm is proposed to achieve the goal of image…
Expand
Highly Cited
2005
Highly Cited
2005
H.264/AVC video authentication using skipped macroblocks for an erasable watermark
Dima Pröfrock
,
H. Richter
,
M. Schlauweg
,
E. Müller
Visual Communications and Image Processing
2005
Corpus ID: 15826220
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data…
Expand
2005
2005
Watermarking security part one: Theory
François Cayre
,
C. Fontaine
,
T. Furon
IS&T/SPIE Electronic Imaging
2005
Corpus ID: 12925916
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The main idea is that information…
Expand
Highly Cited
2004
Highly Cited
2004
A combination of DCT-based and SVD-based watermarking scheme
Liu Quan
,
Qingsong Ai
Proceedings 7th International Conference on…
2004
Corpus ID: 22257288
Digital watermark has been proposed as a solution to the problem of copyright protection of multimedia documents in networked…
Expand
Highly Cited
2002
Highly Cited
2002
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control
Hak-soo Ju
,
Hyun-Jeong Kim
,
Dong Hoon Lee
,
Jongin Lim
International Conference on Information Security…
2002
Corpus ID: 12340918
Anonymity is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace…
Expand
Review
2001
Review
2001
What can we reasonably expect from watermarks?
S. Craver
,
Min Wu
,
Bo Liu
Proceedings of IEEE Workshop on Applications of…
2001
Corpus ID: 58204387
Digital watermarking has been positioned as a solution to copyright protection of digital music, and some doubt exists about its…
Expand
Highly Cited
2001
Highly Cited
2001
Authentication of digital images and video: Generic models and a new contribution
Tiago Rosa Maria Paula Queluz
Signal processing. Image communication
2001
Corpus ID: 32149588
Highly Cited
1999
Highly Cited
1999
Verification watermarks on fingerprint recognition and retrieval
Sharath Pankanti
,
M. Yeung
Electronic imaging
1999
Corpus ID: 1235123
Current 'invisible' watermarking techniques aim at producing watermarked data that suffer no or little quality degradation and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required