The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
HVS theory plays important role in the application of digital image watermarking technique. When inserting watermarking, the visual masking feature of HVS could be fully used to design digital watermarking algorithm with good perceived performance. When extracting watermarking from the damaged image, human's visual feature could be combined to recover the damaged image so as to obtain better effect...
Based on the image edges non-changing characteristic in image format transformation, a new digital watermarking algorithm for huge index image is proposed. The watermarking information was embedded in edges by adjusting the edge pixels; therefore, the algorithm is robust against the lossless image format transformation. The experimental results show that the proposed algorithm has perfect Robustness...
Digital watermarking is an important means for copyright protection. This paper presents a fragile watermarking algorithm for copyright protection based on chaotic system. The algorithm first generates a location matrix. Then it generates the mapping image and identify the embedding location of watermarking in image blocks according to the location matrix generated first. Finally it embeds the watermarking...
Rapid growth in sharing information using internet technologies laid the threats of copyright protection for digital multimedia contents. One of the remedy for intellectual property protection is Watermarking. This paper deals with numerous available digital video watermarking techniques and raised the issue of quality and size of watermarked video. Through experimental study, it has been shown that...
This research paper discussed the usage of watermarking in medical images to ensure the authenticity and integrity of the image and reviewed some watermarking schemes that had been developed. A design of a reversible tamper detection and recovery watermarking scheme was then proposed. The watermarking scheme uses a 640×480×8 bits ultrasound grayscale image as a sample. The concept of ROI (Region Of...
This paper presents a novel approach for embedding a binary watermark into video frames based on the temporal difference and discrete wavelet transform (DWT). We embed a binary watermark in the most activity region which is obtained by the temporal difference in the approximate band at the first level of discrete wavelet transform (DWT) decomposition of video frames. Experimental results demonstrate...
In this paper, a novel fuzzy support vector machine based image watermarking scheme is proposed.Since the application of support vector machine in the process of watermarking technology is only a simple classification of the image. However,the fuzzy support vector machines by selecting the appropriate degree of membership to reflect the different importance of the different sample points. In this...
A new blind geometric robust watermarking scheme is presented based on singular value decomposition (SVD) and discrete wavelet transform (DWT). In the scheme, the host image is decomposed with n-level DWT and the low frequency sub-band is divided into nonoverlapping blocks. SVD is applied to every block. The watermark is embedded into the low frequency DWT coefficients by modifying the largest singular...
Robustness against geometric distortions one of the crucial important issues in watermarking. In this paper, a new singular value decomposition-discrete wavelet transform (SVD-DWT) composite image watermarking algorithm that is robust against watermarking algorithm that is robust against processing is presented. We use DWT and IDWT transform to obtain four different frequency images. Watermarking...
In this paper, the non-uniform discrete Fourier transform (NDFT) is utilized to randomly select sampling points in frequency domain, which could make the embedding points private. Furthermore, to improve security two different chaotic maps is used. One chaotic map is used to choose the NDFT domain embedding points for making them unpredictable; the other is used to encrypt the watermark to be embedding...
Digital watermark technology is used to protect the legal owner's copyrights. We propose a blind watermarking algorithm combination of Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT). The watermark is scrambled by Arnold and embedded in a spread spectrum pattern using pseudo random. The block-based DCT transform of DWT LL sub-band is computed and the pseudo random sequence of...
After intensive revision of different research materials on digital watermarking in related with our topic we find that fidelity, robustness, fragility, and modification are the key variables which need technical support during application. Using the secondary data we also state interrelated concepts of digital watermarking and show the problems in this regard through figure. In addition we develop...
Internet evolution, along with the advancement of digital multimedia tools have create a major impact in making the storage and distribution of multimedia content a straightforward tasks. Thus security of multimedia contents becomes a vital issue and there is a need in protecting the digital content against counterfeiting, piracy and malicious manipulations. Digital watermarking is an evolving field...
The properties of average short-term entropy of audio sequence are discussed in this paper. It is discovered that the changes of average short-term entropy on different scales depict the audio's statistical features well, which can be used to generate zero-watermark of an audio clip. A method of calculating normalized entropy vectors is presented in this paper. To generate the zero-watermark of an...
This paper discusses the security protection mechanisms of digital content, including digital encryption, copying detection, information hiding and digital watermarking, etc. Comparative analyzes the affiliation and difference among them. And take text for example, introduces the current research situation of various mechanisms in the security protection on digital text, explores the application and...
The e1ectronic documents of Distance Education Certificate need to embed the electronic seal. In order to ensure that the electronic seal can not be copied and it has non-repudiation of the signature process and uniqueness of signed certificate, the paper proposes a new electronic seal anti-counterfeit algorithm based on double-fragile digital watermarking. The algorithm uses the program that is embedding...
Digital watermarking is an important technical measure for Intellectual property right protection. Due to the short lifetime of battery of portable device, reducing the energy consumption in this type of the device is sorely needed. In this paper, we proposed an energy efficient, low complexity, robust and secure watermarking algorithm in DS-CDMA communication. In this method, we spread multiple watermarks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.