The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reversible data hiding has attracted more and more attention in recent years. With reversible data hiding, it requires embedding secret data into original image with devised algorithm at the encoder, and marked image can then be delivered to the decoder. At the decoder, both the secret data and original image should be perfectly separated from marked image to keep the reversibility. There are several...
In this paper, we propose a binary value based progressive image watermarking approach for digital right protection. The proposed method embed most watermark information into region of interest(ROI) of an image. Therefore, a client on Internet can decode the watermark while receiving the image, moreover, most watermark information would be decoded while the ROI of the image is received. In order to...
Reversible data hiding has emerged in recent years, and it has the fundamental requirement of reversibility. For reversible data hiding, secret information is embedded into original image with devised algorithms, and the marked image should be delivered to the decoder without any damage. For decoding, both the embedded secret and original image should be recovered perfectly. With these characteristics,...
Hiding data into images can be referred to as a constrained optimization problem. Hence, we proposed a reversible genetic watermarking scheme based on the wavelet packet transform in this paper. Genetic algorithm is used to select an appropriate basis from permissible bases of wavelet packet transform to increase the robustness of the embedded data, and the binary string to be hidden is embedded into...
A scheme for energy compensation is proposed to remedy the deficiency of the DWT-DCT based scheme while applying the quantization index modulation (QIM) to perform blind audio watermarking. Our experimental results show that both the compensated and uncompensated DWT-DCT schemes can achieve satisfactory robustness and imperceptivity at a payload capacity as high as 516.80 bps. However, because of...
In this paper, we propose a genetic watermarking method for stereoscopic images. A stereoscopic image is stored as two images and combined by software while displayed. Thus, a pirate can only clip half of the image to remove the embedded watermark. To prevent the watermarks from being removed, the proposed watermarking method embeds an identical watermark into two half images of a stereoscopic image,...
Lossless data hiding belongs to one major branch in information security researches. The major goal is to retain the lossless property of proposed algorithm, meaning that original image and embedded secret should be perfectly recovered at decoder. Based on the multi-round prediction of differences between original and marked images, enhanced amount of capacity can be obtained while retaining the acceptable...
Reversible data hiding is a newly developed topic in watermarking researches. At the encoder, it relies on slightly modifying the characteristics of original images for embedding secret information. At the decoder, original image and secret information can be separated from marked image with slight amount of overhead. In this paper, we propose the scheme by predicting the difference between output...
In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. On the other hand, a pirate can only clip half of a frame to remove watermarks. In the circumstances, it should be taken into consideration to resist collusion attacks and...
This paper presents a novel scheme to adaptively determine the embedding strength for audio watermarking using quantization index modulation (QIM) in discrete wavelet packet transform (DWPT) domain. While the DWPT facilitates the signal analysis, the employment of a psychoacoustic model helps to not only acquire appropriate quantization steps for watermark embedding but also retrieve these steps back...
In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. In the circumstances, it should be taken into consideration to resist coalition attacks while developing a watermarking scheme for stereoscopic videos. As shown in experimental...
In this paper, we propose a binary value based progressive image watermarking approach for digital right protection. First, a new binary valued watermarking method for wavelet domain images are introduced, and then a progressive watermark detecting scheme for Internet environment is introduced. Its performance was evaluated with two types of experiments (1) robustness against image attacks and (2)...
Reversible data hiding is a newly developed research field in digital rights management (DRM) applications. It is a branch in watermarking researches, with the characteristics of reversibility at the decoder. Secret information can first be embedded into original image, with algorithms designed by researchers, at the encoder. Next, image containing secret data is delivered to the decoder. After reception...
In this paper, we proposed a coevolutionary multi-objective genetic watermarking scheme based on the wavelet packet transform. Wavelet packet transform can be viewed as a generalization of the discrete wavelet transform and a best wavelet basis in the sense of some cost metric can be found within a large library of permissible bases. Coevolutionary multi-objective genetic algorithm is used to select...
In this paper, we propose a new video scrambling and fingerprint embedding method for digital right protection. In this method, a video clip is embedded with v Gaussian watermarks and then scrambled and multi casted from a content server to U clients. A BIBD-based methodology is applied to determine the needed number (v) of sub keys for a total of U clients. In the mean time, the server also decomposes...
In recent years, Camera Smart phone has become a popular consumer electronics product. Young people like to use that to record their daily lives, moreover, they will share these photos and information to others. However, the photos may be used without consent after they are uploaded to Internet. To avoid this problem, one can embed visible and invisible watermarks into images. However, an additional...
Digital watermarking has been an effective means for copyright protection and digital rights management (DRM). One of the current trends for researches in this field would focus on reversible data hiding. Considering the ease of implementation and employing the inherent characteristics of original images, we propose our reversible data hiding algorithm with the rhombus relationships of original pixels...
Digital watermarking has been a practical and interesting research topic in the last decade. Recently, a newly developed branch called reversible data hiding has emerged. It has attracted more and more attention in both researches and applications. With the definition of reversible data hiding, secret message can be hidden by schemes offered by algorithm designers. On the other hand, at the data extraction...
This paper presents a method to embed a watermark in a video for recording copyright information to prevent the video from being pirated. Firstly, a video is cut into small shots, and the shots are classified with clustering algorithm in accordance with their similarity. Then, the DWT (Discrete Wavelet Transform) is applied to transform a watermark into wavelet domain, and embed the wavelet coefficients...
Embedding watermarks into images can be referred to as a constrained optimization problem. Keeping image quality acceptable and maximizing watermark strength is more meaningful and applicable to a user than fixing strength parameter and minimizing distortion. In this paper, we propose an approach that hides watermarks in relationships between wavelet coefficients. This approach would maximize the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.