The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the pioneering studies of Peterson and Watson, the perceptual masking for raw image has been playing an always increasing role in image processing: compression, filtering, indexing, watermarking, fingerprinting are just examples of application fields exploiting the human visual system peculiarities in order to increase their practical impact. The present study establishes the first accurate...
A method of design and implementation of watermarking copyright protection program based on MPEG-4 bit stream is proposed in this paper. The selected DCT coefficients are changed little to meet the specific relationship and represent one bit information. The watermark information is embedded in IVOP color quantized DCT DC coefficient. Not only video spectrum distribution is obtain without the additional...
An image watermarking scheme resisting RST (rotation, scaling, translation) based on RST invariant square region is proposed in the paper. Two SIFT (scale-invariant feature transform) feature points are selected to determine the position, size, direction of the region. The watermark embedding and detection is completed in the square region with quantization, which could guarantee blind detection....
In this paper, a blind video watermarking algorithm based on 3D wavelet transform and Human Visual System (HVS) model is proposed. The proposed method is based on extracting temporal characteristics of video signal and using it to adjust spatial features of each frame. These frames are designed based on HVS model embed the message. Then the message will be extracted from video watermarked through...
Thanks to the exceptionally good properties, chaotic systems have been widely studied and developed in image scrambling and watermarking algorithms in recent years. In this paper, the chaotic standard Baker map is improved and employed to scramble the pixel positions of host image and watermark image in the preprocessing of watermarking. Experimental results show that the scrambling algorithm based...
In this paper, we propose a method used to improve the performance of the digital watermarking based on the modification in the blue channel of the image pixels. The main objective is to reduce the error prediction caused by the high different values of neighbor pixels. In the proposed method, the edge detection technique takes place in order to find out the high different values of neighbor pixels,...
Watermarking is a simple and effective method that is frequently used to protect the copyright of an image. However, watermarks must be strong enough to resist various attacks. In this paper, two-level Discrete Wavelet Transform (DWT) and a trusted third party are applied to ensure the robustness of the watermarks and protect the copyright of an image. The experimental results showed that our proposed...
Several quantization based watermarking techniques have been used for data hiding in which a watermark is embedded into the source image by quantizing the image coefficients and on the receiver end these coefficients are dequantized and watermarks are extracted from the watermarked image. In all these techniques after embedding the watermark some perceptual degradation is observed in the visual quality...
In this paper we propose a blind wavelet-based logo watermarking scheme focusing on resisting to cropping. The binary logo is embedded in the LL2 sub-band of host image, using quantization technique. For increasing robustness of proposed algorithm two dimensional parity bits are added to the binary logo. Experimental results show that the proposed watermarking method can resist not only cropping attack,...
In this paper, we propose a novel Chinese Remainder Theorem (CRT) based watermarking scheme that works in the Discrete Cosine Transform (DCT) domain. We first reviewed a Singular Value Decomposition (SVD) based watermarking scheme followed by an existing CRT based watermarking scheme that works in the spatial domain and their shortcomings are highlighted. The proposed CRT based scheme is more resistant...
In this paper, we have explained an algorithm for preserving robustness for image data hiding. Robust data hiding is the process of extraction the correct data after compression or any other alteration applied on the embedded image. Embedded image is the image that obtains after hiding some information on the original image. Our technique compare with the existing technique called Y. Q. Shi method...
In this paper, an enhanced combined demosaicking and watermarking (CDW) method is proposed. Such a combination leads to lower power and time consumption comparing with being performed separately. In the proposed method, bits are arranged in a special order employing a Sudoku pattern. Results indicate that this arrangement increases robustness against JPEG compression attack.
A robust and geometric invariant digital watermarking scheme for gray-level images is proposed in this paper. The scheme carries out watermark embedding and extraction based on histogram in DWT domain. For watermark embedding, the original image is decomposed into the approximation and details sub-bands. Pixels of the approximation sub-band are grouped into m blocks, each of which has the same number...
This paper introduces a new watermarking algorithm based on discrete chaotic iterations. After defining some coefficients deduced from the description of the carrier medium, chaotic discrete iterations are used to mix the watermark and to embed it in the carrier medium. It can be proved that this procedure generates topological chaos, which ensures that desired properties of a watermarking algorithm...
In this paper, a watermarking scheme, called majority-parity-guided error-diffused block truncation coding (MPG-EDBTC), is proposed to achieve high image quality and embedding capacity. EDBTC exploits the error diffusion to effectively reduce blocking effect and false contour which inherently exhibit in traditional BTC. In addition, the coding efficiency is significantly improved by replacing high...
A new adaptive reversible watermarking algorithm based on wavelet lifting scheme is proposed in this letter. In the algorithm, watermarking image is embedded in the sub-band LL1 generated from 1-level wavelet lifting scheme, and the position information with small size is kept as a secret matrix, the threshold value can be adaptively selected according to the peak-signal to noise rate, such that watermarked...
Digital media is a craze these days. With the present day Internet connectivity the world has become smaller. The copyright protections of intellectual properties have become a necessity for prevention of illegal copying and content integrity verification. Newer data hiding techniques that satisfy the requirements of imperceptibility, robustness, capacity, or data hiding rate and security of the hidden...
This paper presents a novel semi-fragile watermarking scheme for image authentication and tamper detection. The proposed scheme extracts content-based image features from the approximation subband in the wavelet domain to generate two complementary watermarks. Specifically, we generate an edge-based watermark sequence to detect any changes after manipulations. This edge-based watermark encodes the...
Based on the observation that low-frequency DCT coefficients of an image are less affected by geometric processing, we propose a new blind MPEG-2 video watermarking algorithm robust to camcorder recording. Both the embedding and extraction of the watermarks are done in the compressed domain. The mean of the low-frequency DCT coefficients of the video is temporally modulated according to the information...
In this paper, we propose a optimization method of watermarking image based on Cort and DCT. Exploiting human visual system characteristics, our method dynamically chooses the appropriate coefficients of the intermediate frequency and watermarked locations according to different image. Experiments show that the watermarking algorithm performs well in robustness and watermarking imperceptibility.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.