Monday, 20 December 2010

Watermarking Classification



Robust Watermarking

  • Design to survive various system processing and malicious attacks
  • Primary application: copyright protection
Fragile Watermarking
  • Design to detect any modifications (unintentional and malicious attacks) to the watermarked images
  • Primary application: content authentication
Semi-Fragile Watermarking
  • Design to survive system processes (such as JPEG and Wavelet compression) and detect malicious attacks (such as cut and paste) in watermarked image
  • Primary application: selective content authentication



Robust Watermarking

  • Conventional Transforms
  • Feature Extraction for Watermark Embedding and Retrieval
  • Image-in-Image Watermarking
  • Character-in-Image Watermarking
  • Benchmarking – Stirmark and Checkmark


No comments:

Post a Comment