The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital watermarking represents a potential effective method for authentication and ownership rights protection in all kind of multimedia. Digital watermark is hidden information added into the content of multimedia. This paper presents one watermarking method for the color images robust against geometrical attacks. The detailed description of this method is given and some experiments by using the...
In this paper, we present a novel method called Code Book in steganography system based on CDMA (Code Division Multiple Access) techniques having regard to perceptibility of stego-image. These techniques and their variations are widely used in radio telecommunication systems. As it will be shown later, aptly imposed features of CDMA techniques are in consonance with imperatives claimed upon steganography...
Digital watermarking has been proposed as a method for discouragement of illegal copying and distribution of copyrighted material. Currently proposed algorithms of digital watermarking in the context of the video are robust against unintentional attacks, but many of them do not protect enough against malicious attacks. This paper presents a new video watermarking system with improved robustness, which...
Many frame by frame video watermarking methods where proposed, but only a few of them are robust against collusion attacks. These attacks can be easily conducted and their result is an unmarked video. In this paper a frame by frame watermarking method is proposed, which is robust against unintentional attacks, attacks of frame dropping, frame swapping and collusion attacks. Experimental results are...
The concept of the digital rights management architecture for multimedia will be presented in this paper. The DRM architecture involves three subjects that are multimedia content creators, multimedia content owners and clients. From point of view multimedia transmission there are multimedia content providers, multimedia licenser and clients. In proposed paper the typical multimedia content security...
The paper presents biometric security system based on fusion of voice print and hand geometry recognition technologies. Speaker recognition works as text independent and is designed to verify a person using a short utterance. GMM method is used for speaker modeling and GMM-UBM classifier is used for process of matching. Hand geometry technology uses 21 extracted features from image of userpsilas hand...
Digital watermarking is a potential effective method for authentication and ownership rights protection. The digital watermark is hidden information added into the multimedia. This paper presents one watermarking method for the color images robust against geometrical attacks. The detailed description of this method is given and some experiments by using the set of different attacks are performed.
This paper presents automatic verification system based on the voice recognition technology. System works as text independent and is designed to verify a person using a short utterance. GMM method is used for speaker modeling and GMM-UBM classifier is used for process of decision. The main goal of experiments in this paper is to finding the optimum size of the GMM and UBM models (optimum numbers of...
Digital watermarking is a potential effective method for authentication and ownership rights protection. The digital watermark is hidden information added into the multimedia. This paper presents robust digital watermarking in images. One robust digital watermarking based on the synchronization template is presented and some experimental results are presented too.
E-learning has brought a new approach into the learning. E-learning is mainly based on the self-learning and consultations with the lector. This article presents the set of new e-learning courses and certification exams oriented at the ICT areas. The description of the courses will be given and the arrangement of the courses will be described. The different kinds of questions for the certification...
Digital watermarking is a potential effective method for authentication and ownership rights protection. In this paper the robust watermarking techniques are discussed and one robust digital image watermarking technique and the modification of this algorithm are discussed in details. The proposed watermarking technique is based on the discrete Fourier transform and log-polar mapping.
The geometrical attacks are still open problem for many digital watermarking algorithms used in present time. Most of geometrical attacks can be described by using affine transforms. This article deals with digital watermarking in images robust against the affine transformations. The new approach to improve robustness against geometrical attacks is presented. The discrete Fourier transform and log-polar...
Digital watermarking has been proposed as a method for discouraging illegal copying and distribution of copyrighted material. Many proposed methods in digital watermarking are not robust against geometrical attacks. This paper presents a new algorithm that improves the robustness of watermarking methods against geometrical operations. We briefly described affine transformation and its major properties...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.