The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel scheme that is able to merge digital watermarking and content authentication of digital audio is presented in this paper. The embedding of additional data is performed in different signal domains. Watermark embedding is made by frequency hopping method in the Fourier domain, while the additional authentication data is hidden using the LSB modulation in the wavelet domain. The perceptual transparency...
This paper proposes a design for data hiding in digital image that robust with both geometric and common signal attacks. In our method, the watermark is embedded into normalized-based moments robust against affine transforms. In our new approach Contourlet will be used to perform embedding and extracting algorithm.
This paper shows probability of watermarking using Contourlet transform domain under trade-off increasing payload. We continue to develop our previous methods to achieve better results. Experiment results prove our technique is robust from desynchronization attacks as well as other common attacks with a high payload especially for medical images. Our approach improves the performance of the watermarking...
In this paper we introduce a robust image-adaptive data hiding in wavelet domain that hide data in images while imposing minimal perceptual degradation in original image. As it is well accepted, data embedding in the low and mid frequency parts of an image have better robustness under compression attacks than high frequency parts. So our method embeds more data in low frequency coefficients than high...
Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. This method also contains...
In this paper, we have explained an algorithm for preserving robustness for image data hiding. Robust data hiding is the process of extraction the correct data after compression or any other alteration applied on the embedded image. Embedded image is the image that obtains after hiding some information on the original image. Our technique compare with the existing technique called Y. Q. Shi method...
The binary images are two values and have very limited capability in data hiding. In order to improve the robustness and invisibility of watermarkings embedded into the binary images, a novel watermarking scheme is presented, which is based on discrete wavelet transformation (DWT). The original watermarking signals are embedded into the lowest frequency sub-band of the wavelet domains. In addition,...
Based on the observation that low-frequency DCT coefficients of an image are less affected by geometric processing, we propose a new blind MPEG-2 video watermarking algorithm robust to camcorder recording. Both the embedding and extraction of the watermarks are done in the compressed domain. The mean of the low-frequency DCT coefficients of the video is temporally modulated according to the information...
In this paper we analyze the robustness of watermarking method in still images using Haar, Daubecheies and biorthogonal wavelets. The embedding process uses a canny edge detection method and hides the watermark with the perceptual considerations on different modalities of images. The extraction scheme uses non-blind method to retrieve the watermark. We simulate the JPEG compression attack with different...
Print-scan resilient data hiding has not been extensively researched. This paper presents an efficient multi-bit blind watermarking scheme based on a novel Fourier log-polar mapping (LPM). The watermark resynchronization after print-scanning is efficiently solved by an embedded tracking pattern which cannot be removed by template removing attacks and is not detectable for a malicious part. Experimental...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.