The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The audio watermarking systems are more challenge due to the lack of publicly available reference algorithms. It includes the robustness against acoustic path transmission is only evaluated. So this systems will gives the chance of digital watermarking to be used in many applications where such as e.g., second screen applications, audience measurement, and so on. In this paper introducing a simple...
This paper presents, a novel watermarking scheme for digital images which overcomes the problems associated with singular value decomposition. Here, the singular values of the host image are modified using the principal components of the watermark in the DWT domain for providing copyright protection as well as reliability. This method accomplishes with an incorporation of fractional singular values...
A scheme is proposed to hide data in images based on a prioritised ordering of the content of the host image. The embedding process uses the watermark strength to determine the ordering of the 16 regions resulting from the second level wavelet transform DWT decomposed content of the host image. The DWT decomposed sub-bands of the cover image were analysed, transformed using the Pixel Value Difference...
Digital Watermarking may be used to protect databases copyright. A new method for proving the ownership of relational databases is presented. Such approach is applied for protecting both textual and numerical data. This is done by embedding special mark and watermark bits into textual attributes and numerical attributes respectively. Carriage return character and linefeed character, representing 1...
Digital watermarks have been proposed as a way to handle the recent challenging issues like copyright protection and violation. The invisible watermark has many applications including video authentication, copy control, broadcast monitoring, fingerprinting, enhanced video coding etc. This paper propose a digital watermarking scheme on extracted key frames from uncompressed color video with another...
Digital watermarking is an effective and popular technique for discouraging illegal copying and distribution of copyrighted digital image information, which in turn provides an alternative solution for image authentication. This paper proposes an innovative watermarking scheme in which some pixels are randomly selected from original image, so that all of them have a valid 3 × 3 neighborhoods. A binary...
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, embedding is carried out in cumulative form in spatial domain and ICA is used for watermark extraction. For extraction there is no need to access the original image or the watermark, and extraction is carried out only with two watermarked images. Experimental...
In this paper, a robust watermarking scheme using singular value decomposition (SVD) and quantization is proposed. The SVD technique is used to extract important features from a host protected image; the important features are preserved in the singular values which are resistant to a rotation attack. Due to the sensitivity of singular values, the quantization technique is applied to find an appropriate...
In this paper, a novel bipolar time-spread (TS) echo hiding based watermarking method is proposed for stereo audio signals, to overcome the low robustness problem in the traditional TS echo hiding method. At the embedding, echo signals with opposite polarities are added to both channels of the host audio signal. This improves the imperceptibility of the watermarking scheme, since added watermarks...
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark...
This paper proposes an efficient digital audio watermarking scheme using artificial intelligent technique. The watermarks are embedded into the low frequency coefficients in discrete multiwavelet transform domain. The embedding technique is based on quantization process which does not require the original audio signal in the watermark extraction. We have developed an optimization technique using the...
It's a challenge to identify whether the paper archive is credible when it is printed out by the credible electronic archives system. First, this paper improves a DCT-based binary image digital watermarking algorithm. The universal algorithm not only applies to text, but also other binary image. It's so robust that can withstand more than three times attack of paper print-scans; the image is modified...
In this paper a watermarking technique has been proposed. The proposed watermarking technique has been incorporated in the JPEG compression standard. Unlike conventional watermarking techniques which are generally based on manipulation of the AC component in DCT domain, the proposed approach utilizes the DC component that is perceptually significant part, to embed the watermark. The watermark embedding...
Previous works have shown that the geometric structure of images and videos is a suitable embedding domain for watermark information. Using geometric warping data can be embedded very robust against even strong lossy compression. But, since the promising previous approach is based on a fixed pixel raster, the watermark extraction is fragile when rotation, scaling, translation, or shearing with unknown...
In order to solve the copyright issues brought by the distributed rendering system for three-dimensional model, we present this blind watermarking algorithm with high transparency and robustness. In the generation step, we compressed the original watermark information using the UGM model of gray system, for reducing the amount of information embedded in watermark. In the embedding step, we replace...
A blind watermarking algorithm based on wavelet transform domain is proposed. This algorithm use two-level wavelet transform on the original image. Reference the coefficients of level detail sub-band in one-level wavelet transform and adjust the two-level wavelet coefficients in the same direction adaptive to achieve embedded watermark information. The result shows that the embedded watermark has...
A novel multiple watermarking scheme was proposed, which can simultaneously achieve copyright protection and content authentication without the mutual interference. The region of interest (ROI) of a host image was selected by an image energy function, and the fragile watermark was embedded in ROI through quantizing the middle coefficients. Based on visual masking, the robust watermark was embedded...
A blind digital watermarking algorithm based on chaotic is proposed. Logistic system is used to generate chaotic sequence, which is binarizated in the following step. Then one-dimensional binary Logistic sequences are changed into two-dimensional matrix through inverse Zigzag scanning, which is XOR encrypted with the original watermark. Turn the original color image to the YCbCr color spaces, and...
In a digital watermarking scheme, it is not convenient to carry the original image all the time in order to detect the owner's signature from the watermarked image. Moreover, for those applications that require different watermarks for different copies, it is preferred to utilize some kind of watermark-independent algorithm for extraction process i.e. dewatermarking. Watermark embedding is performed...
The previously published three dimensional models (3DM) watermarking schemes have always involved different (i.e. non-standardized) algorithms for watermarks embedding and the subsequent recovery of the attacked watermark embedded 3DM (for watermark extraction). If a 3DM watermarking algorithm does not have standardizing and stable steps to resort the 3DM vertices, the extracted watermarks from a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.