The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Summary The unicast method is a more efficient scheme to transmit multimedia data to massive users to compare with the multicast method. However, the ease of delivery of multimedia data may cause the copyrights to be violated easily, and the fingerprinting scheme is one of effective means for conquering this problem. The fingerprinting process often generates the multimedia contents into many different...
Reversible data hiding has become an important research topic in recent years due to the characteristics of 'reversibility'. At the encoder, we embed the secret information into original image, and deliver the marked image to the decoder. At the decoder, with the aid of side information, both the secret information and original image should be separated from marked image to keep the reversibility...
A stereoscopic video frame contains two images, which are taken in different positions at the same time, and an attacker may make use of the similarity of these two images to remove the embedded watermark. Therefore, a stereoscopic video frame watermarking scheme based on wavelet packet transform was proposed in this paper. Genetic algorithm is used to select an appropriate basis from permissible...
Reversible data hiding has attracted more and more attention in recent years. With reversible data hiding, it requires embedding secret data into original image with devised algorithm at the encoder, and marked image can then be delivered to the decoder. At the decoder, both the secret data and original image should be perfectly separated from marked image to keep the reversibility. There are several...
In this paper, we propose a binary value based progressive image watermarking approach for digital right protection. The proposed method embed most watermark information into region of interest(ROI) of an image. Therefore, a client on Internet can decode the watermark while receiving the image, moreover, most watermark information would be decoded while the ROI of the image is received. In order to...
Reversible data hiding has emerged in recent years, and it has the fundamental requirement of reversibility. For reversible data hiding, secret information is embedded into original image with devised algorithms, and the marked image should be delivered to the decoder without any damage. For decoding, both the embedded secret and original image should be recovered perfectly. With these characteristics,...
Hiding data into images can be referred to as a constrained optimization problem. Hence, we proposed a reversible genetic watermarking scheme based on the wavelet packet transform in this paper. Genetic algorithm is used to select an appropriate basis from permissible bases of wavelet packet transform to increase the robustness of the embedded data, and the binary string to be hidden is embedded into...
In this paper, we propose a genetic watermarking method for stereoscopic images. A stereoscopic image is stored as two images and combined by software while displayed. Thus, a pirate can only clip half of the image to remove the embedded watermark. To prevent the watermarks from being removed, the proposed watermarking method embeds an identical watermark into two half images of a stereoscopic image,...
Lossless data hiding belongs to one major branch in information security researches. The major goal is to retain the lossless property of proposed algorithm, meaning that original image and embedded secret should be perfectly recovered at decoder. Based on the multi-round prediction of differences between original and marked images, enhanced amount of capacity can be obtained while retaining the acceptable...
Reversible data hiding is a newly developed topic in watermarking researches. At the encoder, it relies on slightly modifying the characteristics of original images for embedding secret information. At the decoder, original image and secret information can be separated from marked image with slight amount of overhead. In this paper, we propose the scheme by predicting the difference between output...
In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. On the other hand, a pirate can only clip half of a frame to remove watermarks. In the circumstances, it should be taken into consideration to resist collusion attacks and...
In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. In the circumstances, it should be taken into consideration to resist coalition attacks while developing a watermarking scheme for stereoscopic videos. As shown in experimental...
Progressive transmission of multimedia is an important application in multimedia communications. We employ reversible data hiding for protecting the copyright of progressively transmitted images. We consider carefully altering the luminance differences between base and enhancement layers in progressive transmission, and obtain similar qualities of output images with enhanced amount of capacity. Simulation...
In this paper, we proposed a co evolutionary genetic watermarking scheme based on wavelet packet transform. Wavelet packet transform can be viewed as a generalization of the discrete wavelet transform and a best wavelet basis in the sense of some cost metric can be found within a large library of permissible bases. Co evolutionary genetic algorithm is used to select an appropriate basis from permissible...
In this paper, we propose a binary value based progressive image watermarking approach for digital right protection. First, a new binary valued watermarking method for wavelet domain images are introduced, and then a progressive watermark detecting scheme for Internet environment is introduced. Its performance was evaluated with two types of experiments (1) robustness against image attacks and (2)...
Reversible data hiding is a newly developed research field in digital rights management (DRM) applications. It is a branch in watermarking researches, with the characteristics of reversibility at the decoder. Secret information can first be embedded into original image, with algorithms designed by researchers, at the encoder. Next, image containing secret data is delivered to the decoder. After reception...
In this paper, we proposed a coevolutionary multi-objective genetic watermarking scheme based on the wavelet packet transform. Wavelet packet transform can be viewed as a generalization of the discrete wavelet transform and a best wavelet basis in the sense of some cost metric can be found within a large library of permissible bases. Coevolutionary multi-objective genetic algorithm is used to select...
In this paper, we propose a new video scrambling and fingerprint embedding method for digital right protection. In this method, a video clip is embedded with v Gaussian watermarks and then scrambled and multi casted from a content server to U clients. A BIBD-based methodology is applied to determine the needed number (v) of sub keys for a total of U clients. In the mean time, the server also decomposes...
In recent years, Camera Smart phone has become a popular consumer electronics product. Young people like to use that to record their daily lives, moreover, they will share these photos and information to others. However, the photos may be used without consent after they are uploaded to Internet. To avoid this problem, one can embed visible and invisible watermarks into images. However, an additional...
Reversible data hiding can be classified into two major research branches, one is by use of the histogram of original image, named the H scheme, and the other is by manipulating pixel relations between adjacent pixels, called the difference expansion (DE) scheme. Both schemes have their own advantages and drawbacks, but the inherent characteristics of original image are seldom considered in existing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.