The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The main issue in the digital content marketplace is copyright protection of digital content. Sometimes the digital information may copy or alter during transmission. Thus, there is a need to develop an authentication method, which is very effective to protect the digital data. There are different watermarking techniques, which use different transforms. In this paper, a Discrete Wavelet Transform...
In the present scenario, because of the great success of the internet, the exchange of digital media over the internet became easy. We can easily transmit audio, video and images. But security and copyright protection of this digital media became a serious issue. So an emerging technique, known as digital watermarking, is used. It is widely used for protecting digital media from duplicacy and unauthorized...
Now a day's large amount of digital information such as video, audio or image is spread over the internet. So it should be a great challenge for all researchers to provide security to such a type of digital data. Also the piracy and copyright is emerging issue when digital information in the form of video, audio & image is transmitted over the transmission media. So to prevent the problem of piracy...
The Proposed Genetic Algorithm based Digital Image watermarking scheme is improved by embedding the watermark in Third Level Discrete Wavelet Transform (DWT) of original image, after applying Singular Value Decomposition (SVD) to watermark image. The Genetic Algorithm optimization technique (GA) is used for best scaling factor (SF) to modify the SVD coefficients of watermark image. The PSNR and NCC...
A modified blind image watermarking algorithm using discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) is proposed in this paper. One level DWT operation is performed on original host image using Haar wavelet and approximation (LL) sub-band is selected to split it into two sub images. DCT and SVD operations are performed in both sub images using...
Hybrid domain digital image watermarking scheme using discrete Wavelet Transform (DWT) and Singular Value decomposition (SVD) is proposed in this paper. Original host image is decomposed using DWT to obtain coefficients of approximation sub-band (LL3) and it is selected for watermark insertion. Singular values of watermark image are obtained using SVD operation and scaling factor is used to modify...
This paper proposes a novel optimization method for digital images watermarking in the Discrete Wavelet Transform (DWT) domain. Digital image watermarking has proved its efficiency in protecting illegal authentication of data. The visibility factor of the watermark is the significant parameter that helps in improving the perceptual transparency and robustness of digital watermarking system. The swap...
Steganography is used to hide the secret information within a cover media in such a way that the existence of the message could not be noticeable. Here we are considering audio file as cover media and text message as secret information. The secret information is embedded in a cover media as noise as the HAS cannot detect the sound less than 20Hz or greater than 20000Hz. Generally LSB algorithm is...
A robust and high quality image watermarking method has high demand for protection of copyrighted multimedia data over internet. The existing image watermarking methods generally exploit the correlated color models due to which only one color component at a time can be used for embedding the watermark. Therefore, in this paper, a novel steerable pyramid transform (SPT) based digital image watermarking...
In this paper, we propose a genetic watermarking method for stereoscopic images. A stereoscopic image is stored as two images and combined by software while displayed. Thus, a pirate can only clip half of the image to remove the embedded watermark. To prevent the watermarks from being removed, the proposed watermarking method embeds an identical watermark into two half images of a stereoscopic image,...
The most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. The relationship between the two requirements is completely conflict...
In recent years, singular value decomposition has become a popular tool for image watermarking. In this paper, we propose a new blind watermarking scheme by quantizing the singular values of wavelet component. To optimize the system performance, we treat the image watermarking as a multi-objective optimization problem based on non-dominated sorting genetic algorithm II. Based on this new perspective,...
In this paper, we proposed a coevolutionary multi-objective genetic watermarking scheme based on the wavelet packet transform. Wavelet packet transform can be viewed as a generalization of the discrete wavelet transform and a best wavelet basis in the sense of some cost metric can be found within a large library of permissible bases. Coevolutionary multi-objective genetic algorithm is used to select...
In this paper, a particle swarm optimization (PSO) based audio watermarking scheme is proposed. The watermark is embedded by modifying singular values of the host audio signal with the spread spectrum method. The designed optimization technique employs PSO to search for optimal watermark strength by keeping adapting the fitness values so that the conflicting requirements of robustness and imperceptibility...
An optimized high payload spread spectrum (SS) image watermarking scheme robust against fading-like collusion attack is proposed using genetic algorithms (GA) in multiband (M-band) wavelets. M-band decomposition of host offers advantages of better scale-space tiling and good energy compactness that make watermarking robust against frequency selective fading. On the other hand, GA would determine threshold...
Image watermarking, the process of embedding data into a cover image and extract watermark under different attacks, can be used primarily for copyright protection and other purposes. Two key components in watermarking are perceptual transparency and robustness of the watermark. A tradeoff between these two features exists, which can be introduced as an optimization problem. Simulated annealing and...
Recently, much interest is being taken to protect the copyright of digital data and prevent illegal duplication of it. Towards this purpose, this paper proposes an imperceptible blind watermarking framework suitable for proving ownership claims for large 3D meshes. The basic idea is to decompose the original mesh into a series of details at different scales by using irregular lifting-based wavelet...
In Digital Watermarking a low energy signal is imperceptibly embedded in another signal. The low energy signal is called watermark. Earlier techniques based on spatial and frequency domain, had the problems of a poor fidelity especially with higher payloads of watermark image. Unsatisfactory value of Peak Signal to Noise Ratio (PSNR) of watermarked image resulting in image quality degradation was...
Audio Steganography is a method that ensures secured data transfer between parties normally in internet community. In this paper, we present a novel, principled approach to resolve the remained problems of substitution technique of Audio Steganography. We use most powerful encryption algorithm (RSA) to encrypt message in the first level of security, which is very complex to break. In the second level,...
This paper proposes an efficient digital audio watermarking scheme using artificial intelligent technique. The watermarks are embedded into the low frequency coefficients in discrete multiwavelet transform domain. The embedding technique is based on quantization process which does not require the original audio signal in the watermark extraction. We have developed an optimization technique using the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.