The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Summary Applications for robust watermarking is one of the major branches in digital rights management (DRM) systems. Based on existing experiences to assess how good one robust watermarking is, it is generally agreed that three parameters or requirements, including the quality of watermarked contents, the survivability of extracted watermark after deliberate or unintentional attacks, and the number...
Summary A robust video watermarking method is described that can embed watermarks immune to not only rotation, scaling, and clipping and translation but also random geometric distortion and any of their combinations. It can detect watermarks without any search for canceling the effect of random distortion. Rotation, scale, and translation are canceled by searching for the angle, size, and origin of...
Summary The technique of digital image inpainting is used to repair scratches or stains in aged images or films. Furthermore, inpainting can also be used to remove selected objects from a video. Video inpainting is more difficult than image inpainting because video inpainting considers two or more frames with the same or different backgrounds. In order to prevent an unexpected user from eliminating...
Summary Data hiding is widely used for concealing secrets in images so that senders can securely transfer these secrets to the receivers. In data embedding schemes, the image quality, hiding capacity, and compression ratio as well as the security of the hidden data are all critical issues. Instead of using traditional data encryption techniques to encrypt secret data in the preprocessing phase, this...
Summary Digital watermarking techniques have been explored extensively since its first appearance in the 1990s. However, watermark robustness to geometric attacks is still an open problem. The past decade has witnessed a significant improvement in the understanding of geometric attacks and how watermarks can survive such attacks. In this chapter, we will introduce a set of image watermarking schemes...
Summary With the rapid technological advancement in the development, storage and transmission of digital content, watermarking applications are both growing in number and becoming complex. This has prompted the use of computational intelligence in watermarking, especially for thwarting attacks. In this context, we describe the development of a new watermarking system based on intelligent perceptual...
Summary This chapter presents a secure and simple content-based digital signature method for verifying the image authentication under JPEG, JPEG2000 compression and scaling based on a novel concept named lowest authenticable difference (LAD). The whole method, which is extended from the crypto-based digital signature scheme, mainly consists of statistical analysis and signature generation/verification...
Summary The unicast method is a more efficient scheme to transmit multimedia data to massive users to compare with the multicast method. However, the ease of delivery of multimedia data may cause the copyrights to be violated easily, and the fingerprinting scheme is one of effective means for conquering this problem. The fingerprinting process often generates the multimedia contents into many different...
Summary With the development of image halftoning techniques and computer networks, a large quantity of digital halftone images are produced and transmitted in the Internet. Meanwhile, hiding data in images becomes a powerful approach for covert communications, copyright protection, owner announcement, content authentication, traitor tracing, etc. This chapter proposes two look-up table based methods...
Summary Digital information and data are transmitted more often over the Internet now than ever. Free-access digital multimedia communication unfortunately provides virtually unprecedented opportunities to pirate copyrighted material. Therefore, the idea of using a digital watermark to detect and trace copyright violations has stimulated significant interests among engineers, scientists, lawyers,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.