The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Geographical Information System (GIS) is used to collect, manipulate, analyze, and display the geospatial data. The compilation and management of this spatial data is expensive and time consuming task. Due to rapid growth of distributed networks and Internet, it becomes easy to handle data but at the same time it becomes easy to copy or distribute the spatial data. Therefore copyright protection,...
In this paper, an invisible watermarking algorithm for satellite imagery using Curvelet Transform is proposed. The Raster image is split into smaller non-overlapping blocks. Haralick Co-occurrence texture features [1] are used to identify the area for embedding watermark in these blocks of Raster image. Thus multiple watermarks are embedded in any given image. Edges are selected for embedding watermark...
This paper proposes a local digital image watermarking method based on robust feature extraction. A robust feature extraction method is proposed based on DAISY to extract feature regions. Each feature region is decomposed into approximation and details sub-bands by wavelet transform and the watermark is then embedded into and/or extracted from the approximation coefficients. Spread Transform Dither...
The large structure of dataset for sharing for particular target or authenticate target but there are some other parties that can attack on data easily and use that data illegally and can claim that data ownership. Attacker can gain ownership on that sharing data. Due to this original data get modified and quality of data also reduced so this original data is not useful for any extraction information...
With the development of the Internet, authentication and copyright protection of digital products becomes an important issue. In this paper, a zero-watermarking algorithm based on audio content is proposed, which can stand against synchronization attacks. The audio signal is divided into several segments according to the size of watermarking image. After that, SVD transform is performed for each matrix...
We propose in this paper, a robust blind watermarking algorithm for 3D mesh models by embedding bits of signature in distributions of vertex norms. Using the Fast Marching Method (FMM), we define regions on the mesh according to a reference location. This robust source location are selected by the salient point detector based on Auto Diffusion Function (ADF). We show that robustness against cropping...
The development of the World Wide Web has not only facilitated the digital data processing and transmission but also has led to ease the illegal distribution and reproduction of digital multimedia online. Several techniques have been proposed to limit the illegal use of transmitted data such as steganography, cryptography and watermarking techniques. The watermarking approach consists in embedding...
Recently the use of QR code for data coding becomes significantly increasing especially for coding identity, health and other specific data. Since some types of data such as identity, health, etc is private data then it needs to be further authenticated. Furthermore, the owner of the identity should be authenticated as well. Therefore, we have to insert biometric features which will be further authenticated...
In ubiquitous multimedia applications, how to protect the digital copyright for multimedia data has been a difficult task. In this paper, a novel self-adaptive video dual watermarking, which is combined the motion characteristics detection with the geometric invariant of Scale-invariant feature transform (SIFT) is proposed. For each frame, the motion characteristics are calculated as the maximum of...
Currently, the problems of digital copyright have become increasingly prominent. However, digital watermark technology is the new technology in the field of copyright protection. And it has certain defects in the practical application. It cannot effectively solve the problem of the geometric attacks in terms of image and the impact on the QR code fast scanning characteristics. In order to solve the...
In recent years, due to the increment in the image editing software applications and the easiness of using these, the probability of malicious changes on the images has also increased. Copy-move forgery is one of the most widely applied modification types on the images. In case of that the copied region is rotated before being pasted, forgery detection becomes difficult. Many researchers try on proposing...
Recently, the feature point matching based water-marking techniques have been paying attention for resisting the geometric attacks. We present a performance analysis of robust watermarking using linear and nonlinear feature. In particular, we consider the geometric attacks and the signal processing attacks for image watermarking. In order to analyze the efficiency of linear and nonlinear feature,...
In today's world a lot much of the intellectual work is produced and distributed in the digital form and thus it becomes very difficult to prove the ownership claim by the legitimate owner and to stop the unauthorized use of the intellectual property. Robust watermarking provides solution to this problem. In this paper, we have categorized the popular techniques of transform domain robust image-adaptive...
The rapid growth of digital video distribution has highlighted new important issues in digital rights management, as well as in other important applications such as video authentication. Digital watermarking offers a promising solution against piracy and it is therefore a very active area of research. However, robustness to video manipulations, either malicious or not, is a demanding task because...
Digital watermarking is a technique used to embed an extra piece of information into multimedia signals. Aiming at content-based audio retrieval applications, a robust audio watermarking scheme resist to low bits rates compression is proposed. The performance of proposed algorithm is analysis by common signal processing such as Mp3 compression, Real compression, filtering, amplitude compression, equalization,...
In most of the document images, there are segments containing variations of generatable and non-generatable information content. Hence, variable amount of watermark can be applied to these segments of the document image. This could reduce the time required for embedding the watermark. In this paper, a novel intelligent robust watermarking scheme is proposed that intelligently embeds the watermark...
Image Forgery is a real time issue in this present era and that causes inimical effects in the society. This is more common due to the availability of numerous image modifications software. The ultimate aim of this project is to provide a best optimal solution to this existing problem. The forgery in images includes object removal, object addition, unusual color modifications. There are many existing...
For vector maps, obtaining precise locations to hide the data integrity marker with existing fragile watermarking algorithms is technically challenging. Using a fragile watermarking technique based on a LSB data insertion, a feature-based fragile watermarking algorithm that inserts watermark for each feature and detects the tampered features with high accuracy was proposed. In the proposed algorithm,...
This paper describes a method against geometric distortion of digital watermarking image by means of Hausdorff distance measuring, which matches the feature points, and calculates similarity between two point sets (maximum distance). In this paper, Harris feature points are firstly extracted into feature point set according to the response of the Harris detector and the field size, and then secondly...
Most Discrete Wavelet Transform(DWT)/Singular Value Decomposition(SVD) watermark methods are robust to common attacks, such as loss compression, noise and filtering attacks, but they cannot resist geometrical attacks. As Scale Invariant Feature Transform(SIFT) feature points are invariant to rotation, scaling and translation, a blind DWT-SVD watermark method against geometrical attacks based on SIFT...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.