# Watermarking schemes

### Key Length Estimation of Zero-Bit Watermarking Schemes

**Watermarking**Secu- rity which is more in line with the cryptographic ...zero-bit

**watermarking**

**schemes**based on normalized correlation by estimating the region of equivalent ...these

**schemes**...

6

### Optimization of Natural Watermarking Using Transportation Theory

7

### A robust image watermarking technique based on quantization noise visibility thresholds

**watermarking**was born. Since its inception, many

**watermarking**techniques have appeared, in all pos- sible transformed ...in

**watermarking**literature concerns the human visual system ...based ...

64

### Practical Key Length of Watermarking Systems

**watermarking**

**schemes**, the information leakage is not null, and as the ad- versary keeps on observing, the equivocation decreases down to 0 (discrete ...

5

### Audio asymmetric watermarking technique

5

### A constructive and unifying framework for zero-bit watermarking

**watermarking**, a watermark, carrying no hidden message, is inserted in a piece of ...famous

**watermarking**

**schemes**are indeed solution to this ‘fundamental’ ...

28

### Blind image watermarking using discrete cosine and discrete wavelet transforms

**watermarking**

**schemes**like those based on the discrete Fourier Transform (DFT) [Pun2006; Solachidis2001 ], the discrete cosine transform (DCT) [Hernandez2000; Chu2003 ] and the discrete wavelet ...

88

### Towards Robust and Secure Watermarking

**watermarking**

**schemes**with a security oriented point of view, and then evaluating their robustness compared to state-of-the-art but unsecure tech- ...robust

**watermarking**technique and to propose ...

8

### TCQ Practical Evaluation in the Hyper-Cube Watermarking Framework

**watermarking**has shown a high potential for high-rate robust

**watermarking**. In this paper, we carry on ...

7

### Towards Provably Robust Watermarking

**Watermarking**techniques are used to help identifying copies of publicly released ...of

**watermarking**

**schemes**against arbitrary attackers, and the for- malization of those results in ...

17

### Audio watermarking via EMD

7

### Watermarking security

**watermarking**

**schemes**have bigger detection areas (for a given probability of false alarm) or more efficient embedders so that the watermarked feature vector f ...

31

### A numerically stable fragile watermarking scheme for authenticating 3D models

13

### Robust drift-free bit-rate preserving H.264 watermarking

40

### PRIMITIVE MULTIPLE SCHEMES

55

### Towards a Simpliﬁed Perceptual Quality Metric for Watermarking Applications

10

### Adversarial frontier stitching for remote neural network watermarking

**watermarking**) the model using those trivial points that would significantly degrade model accuracy, the stitching algorithm first (c) identifies specific data points by the decision frontier (both ...

13

### A Multi-purpose Objective Quality Metric for Image Watermarking

6

### Intersection theory on punctual Hilbert schemes and graded Hilbert schemes

17

### 2013 — Intelligent watermarking of long streams of document images

**watermarking**as stochastic optimization prob- lem and apply EC to such end (optimization of embedding ...of

**watermarking**systems is that the objective functions are usually noisy ...a ...

260