The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most H.264 watermarking schemes only embed the watermarks on I-frames, and are therefore extremely fragile under temporal attacks (e.g., frame dropping). To obtain the robustness under temporal attacks for H.264 watermarking systems, this paper presents a robust perceptual image hashing based temporal synchronization method. We extract robust geometric information from the 4times4 block mean map of...
This paper presents a speech information-hiding scheme that is integrated with the CELP (Coded Exited Linear Prediction) speech coding method. The G.729 codec (CS-ACELP) is used to test the efficiency of this scheme. The index-constrained method is applied for the secret information embedding. The selected bits of first-stage and residual vector indices during the Predictive Two-stage Vector Quantization...
Most available H.264 watermarking methods either require large expense of time or are rather fragile to intended attacks. In this paper, we present a novel watermarking scheme, which satisfies with the requirements of both rapidity and robustness. The proposed scheme directly embeds watermarks into H.264 bit streams at the decoder by modifying the quantized DC coefficients in luma residual blocks...
For original paper see J. Shich, D.Lou and M. Chang, ibid., vol.28, p.428-440, (2006). In a recent paper, a robust water-marking approach for hiding grayscale image watermark into digital images based on SVD (singular value decomposition) is proposed by Shich et al. This comment demonstrates that the high robustness of the proposed scheme against various attacks is a result of improper algorithm design...
In this paper, a novel robust audio watermarking algorithm based on discrete cosine transform (DCT) and vector quantization (VQ) is proposed. The original audio signal is first segmented into frames. The embedding process for each frame is as follows. First, the original frame is DCT transformed, and several middle-frequency coefficients are composed of a vector to be modified. Then the labeled-codeword...
In this paper, a novel robust audio watermarking algorithm is presented. It takes full advantage of the multi-resolution and the energy compression properties of the discrete wavelet transform (DWT) and discrete cosine transform (DCT) respectively, and embeds a pseudorandom permuted binary image in the original audio signal by vector quantization (VQ). The original audio is first transformed using...
Robust watermarking schemes often rely on hiding watermarks into carefully selected host components capable to survive a variety of attacks, or capability of detector to successfully decode watermark even with fewer components. However for a variety of permanent media damages both the credibility of such elements or detector's performance can be compromised. Through spatial domain extension of visual...
In this paper we present a novel framework employing biometric recognition and robust watermarking technique to achieve a number of media privacy and security objectives. Scheme description and presented test results support and prove the claims of practicability and effectiveness of the model for a number of privacy and security related applications.
This paper proposes a scheme to hide multiple watermarks in transparencies of visual cryptography. On one hand, the main properties of the traditional visual cryptography are still maintained. On the other hand, not only the encrypted image can be visible when stacking the transparencies, but also two extra watermarks can be extracted with simple computations. The scheme can be applied to hide some...
With halftone images widely used in books, magazines, printer outputs, and fax documents, it is desirable to embed data in halftone images for copyright protection, content authentication and tamper detection. This paper proposes a novel watermarking method for error diffused halftone images based on the binary pseudo-wavelet transform. We employ the binary pseudo-wavelet coefficients' distribution...
This paper presents a digital watermarking scheme based on the discrete cosine transform (DCT) and singular value decomposition (SVD). In the proposed method, selected mid-band DCT coefficients from 8x8 block DCT are selected to form blocks which are later decomposed into three matrices, i.e. U, S and V. Finally the original watermark is also partitioned into blocks and then embedded into the matrix...
This paper proposes two transparency authentication schemes used in visual cryptography, which are based on watermarking techniques. In the first scheme, a secret image can be perceptible when stacking two transparencies. In addition, another watermark image is visible when shifting one transparency to an appropriate position and stacking it with the other transparency. In the second scheme, both...
This paper proposes a scheme to hide two watermarks in visual secret sharing of a gray level image. One watermark is embedded during secret image halftoning, and the other watermark is hidden during the halftone image encryption. A non-expansion visual secret sharing model is used to encrypt the halftone image. In data extraction, only exclusive-OR operation is needed. Experimental results show the...
This paper proposes a reversible data hiding scheme for 3D point cloud model. The method exploits the high correlation among neighboring vertices to embed data. It starts with creating a set of 8-neighbor vertices clusters with randomly selected seed vertices. Then an 8-point integer DCT is performed on these clusters and an efficient highest frequency coefficient modification technique in the integer...
The security of the "autoregressive (AR) watermark in AR host" signal model is investigated. It is demonstrated through analysis and Monte Carlo simulation that the AR watermarking model is asymptotically as secure as the "white watermark in white host" model under the guessing attack
Most of the researchers on watermarking techniques have focused on protecting the copyright information in various data such as audio, image and video signals. However, relatively less watermarking techniques are in respect of copyright protection of 3D model objects. After analyzing the data structure of 3D models, we propose a novel and efficient algorithm which allows embedding public watermarks...
A novel robust digital image watermarking algorithm based on predictive vector quantization is proposed in this paper. The robust watermark is embedded in the image by selecting the prediction mode of each PVQ coded vector according to the watermark bit. The proposed watermarking algorithm is proved to be robust against both friendly and hostile attacks, such as JPEG compression, VQ compression and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.