The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we utilized the relationship between two blocks to generate the robust feature. Such a feature is very stable under various image processing operations. The XOR operation is applied to the feature and the watermark to create the secret key. Moreover, a mechanism is developed to resist the cropping attacks. The experimental results demonstrate our technique is highly robust against image...
Time series is a ubiquitous form of data and the analytics of time series is attracting increasing interest recently. In the context of time series data mining, similarity measure has the fundamental importance because many data mining techniques depend on it. Dynamic time warping (DTW) is considered to be the most popular similarity measure for time series and it is alignment-based. However, it has...
Recently, the protection of the ownership information of digital images have received much attentions because illegal copying of digital multimedia has become much easier due to the advance of multimedia technologies. The ownership information is embedded as a watermark into the image for the purpose of asserting the copyright, hence, it should be very robust against various attempts to break or remove...
As digital technologies advance, it is very easy to forge a paper-based certificate or images to deceive people, and the counterfeits look almost the same as the originals. Because such forgery causes tremendous losses to the society, the demand for automatic and on-line authentication of paper-based images has been increasing. To solve such a problem, watermarking techniques against the “print-and-scan”...
Image watermarking can be distinguished between methods that hide information by adding and multiplying. In some applications, not the more information embedding is, the more performance is especially for multi copyright protection. In this paper, robustness performance of these two watermarking methods are compared with the same conditions, including original image, watermark signal, fidelity, detection...
A feature-based robust watermarking algorithm against geometric transformation is proposed in this paper. As salient features in the image are relatively stable under geometric transformation, they may serve as reference points to synchronize the processes of watermark embedding and detection. To further increase the repeatability of feature detection, a novel feature enhancement technique is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.