The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel method is proposed which deals with secure extraction of data by utilizing transform based image watermarking techniques. The image is embedded with a watermark using a combination of Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) in this scheme. The conventional transforms are applied in an optimized mode in these schemes in different...
The digital image watermarking technology is widely used to protect intellectual property and to authenticate digital contents in the network environment. The aim of the paper is to invoke the improved Laplacian Pyramid transform to develop a new image watermarking scheme. Specifically, the host image is decomposed and reconstructed by using the improved Laplacian Pyramid transform. Then, the mid...
With the development of the Internet, authentication and copyright protection of digital products becomes an important issue. In this paper, a zero-watermarking algorithm based on audio content is proposed, which can stand against synchronization attacks. The audio signal is divided into several segments according to the size of watermarking image. After that, SVD transform is performed for each matrix...
A novel method of semi-blind image watermarking is proposed in this paper. The proposed method is performed by using slant transform along with lifting wavelet transform and singular value decomposition. Host images are decomposed using Lifting wavelet transform. Singular value decomposition is applied on its selected sub band. Singular value decomposed cover image is watermarked using slant transformed...
Handling a great number of users and surviving different types of attacks present fundamental challenges of the majority fingerprinting systems in the tracing traitor field. In this paper, the proposed technique consists in embedding a fingerprint, a QR code in the audio stream extracted from the media release. Using the QR-code provides several advantages as supporting a large amount of information...
Watermark-based copyright protection techniques have been investigated for more than two decades in the signal processing and the digital rights management communities. Most efforts have been devoted on hiding the watermark and increasing the robustness of the embedded watermark under common signal processing operations and geometric transformations. In this paper, we build our scheme based on these...
Digital watermarking is a technique used to embed an extra piece of information into multimedia signals. Aiming at content-based audio retrieval applications, a robust audio watermarking scheme resist to low bits rates compression is proposed. The performance of proposed algorithm is analysis by common signal processing such as Mp3 compression, Real compression, filtering, amplitude compression, equalization,...
Digital watermarking is a technique that consists in hiding binary information within a signal in an imperceptibly way. This technique plays an important role for copyright protection of multimedia data. In this paper an efficient robust audio watermarking algorithm based on double transforms is introduced. In a first step, the original signal is decomposed by discrete wavelet transform (DWT). Then...
This paper proposes a robust zero-watermarking algorithm based on Complex Zernike moment to resist various signal processing operations and geometric transformations. Zero watermarking algorithm changes the operation method of embedding watermark in the original data. Instead, it employs the significant characteristics of the original data to construct watermarking information to successfully avoid...
This paper proposes a method to establish joint ownership of digital images by embedding imperceptible digital pattern in the image. This digital pattern is generated from biometric features of more than one subject in a strategic matter so that the identification of individual subject can be done and the multiple ownership of the digital images can be established. This digital pattern was embedded...
The existing digital watermarking schemes use a digital pattern like pseudorandom number sequence, a logo image or a digital signature as the watermark. Use of such watermarks is not convincing as the ownership of such a watermark is not clear for ownership claims. This paper proposes an efficient digital watermark generation technique from biometric iris data which will be unique and can be owned...
Audio data hiding techniques have been applied various applications such as audio watermarking and steganography. In this paper, we propose an audio data hiding method based on the phase information of the modulated complex lapped transform (MCLT) coefficients and evaluate the performance in terms of audio quality and robustness. To embed and extract the data, the proposed technique modifies the phases...
This paper introduces a new set of 2D transforms, called Quaternion Radial Tchebichef Moments (QRTMs), in color image watermarking. The proposed scheme constitutes the first attempt in moment-based color image watermarking. The watermark logo information is iteratively embedded enhancing its integrity with the application of the majority-vote decision rule in the detector side. Scheme's robustness...
The main objective of developing an image watermarking technique is to satisfy both imperceptibility and robustness requirements. To achieve this objective, a hybrid image watermarking scheme based on discrete wavelet transform and singular value decomposition is proposed in this paper. In our approach, the edge information of an image is used to embed the watermark. In addition, we apply the particle...
Developing a watermarking method that is robust to cropping attack is a challenging task in image watermarking. The moment-based watermarking schemes show good robustness to common signal processing attacks and some geometric attacks but are sensitive to cropping attack. In this paper, we modify the moment-based approach to deal with cropping attack. Firstly, we find the probability density function...
A new audio watermarking algorithm based on wavelet domain transformation is being presented in this paper. The proposed algorithm follows embedding and extraction processes. In the embedding procedure, the audio signal is divided into non overlapping frames and then each frame is decomposed into 3-level wavelet transform using 4-coefficient daubechies wavelet (db4) filter. Then after using a quantization...
A robust and geometric invariant digital image watermarking scheme based on robust feature points detector and local Zernike transform is proposed in this paper. The robust feature points detector is proposed based on SIFT algorithm to extract circular patches. A local Zernike moments-based watermarking scheme is raised. Each extracted circular patch is decomposed into a collection of binary patches...
A new transparent and robust watermarking method against JPEG compression attack based on a perceptual approach is proposed. The main idea is to embed the watermark into regions where the blocking artifact has no effect on the watermark. These regions are identified by using a spatial prediction model of blocking effect. A JND (Just-Noticeable-Difference) model is then used to control the embedding...
This paper provides a algorithm of digital watermarking in MP4 Music. Cooperating the characteristic of audio and using the energetic variation for three next sections to seek for the new appropriate method. The action of embedding digital watermark will not affect the quality of audio. Furthermore, this embedding will not only provides enough robustness to bear several kinds of attacks, including...
A novel image watermarking algorithm is developed which is based on Contourlet Transform (CT) and Matrix Factorization methods such as Singular Value Decomposition (SVD) technique and QR factorization method. In the proposed scheme, the original image and the watermark image are transformed into subbands by Contourlet Transform. The lowest frequency coefficients of the CT decomposed original image...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.