The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we use the Dual Tree Complex Wavelet Transform (DT - CWT) to watermark an image using a binary watermark which is blind in nature. It was observed that when Just Noticeable Difference (JND) of the image is used as a strength multiplier of the watermark while embedding the binary image in the DT - CWT coefficients of the host image, there is a significant improvement in the robustness...
Copyright protection for multimedia data owners is of crucial importance as the duplication of multimedia data has become easily with the advent of Internet and digital multimedia technology. Current digital watermarking techniques for preserving the product ownership are rule-based and not directly deal with the data synchronization, therefore their decoding performance reduces significantly when...
This paper deals with a blind hybrid digital watermarking algorithm for the copyright protection and authentication of magnetic resonance tomography images. Medical image watermarking requires extreme care when embedding watermark information in the medical images, to protect the image quality from being violated and to avoid the wrong diagnosis that might occur. The proposed algorithm contains robust...
Watermarking has been used widely for passing the confidential information over Internet, a good watermark will be imperceptible, robust over the various geometric and non-geometric attacks. The watermark shouldn't be easily extracted by the hacker, to achieve this several watermarking methodologies were developed for different domains namely spatial, frequency and wavelet domains using DCT, DWT and...
Securing multimedia data from undesired manipulation is a widely investigated topic in the state of the art. A large number of techniques has been developed for protecting images, videos, and also audio from malicious attacks. Nowadays new imaging systems pose new challenges from the data protection point of view. In particular, plenoptic cameras allow to record multiple views of a scene by using...
This paper discusses a technique used to insert a watermark into scanned colored PDF files. The watermarking aims to protect the copyright ownership and authenticate the PDF documents. A logo has been used as a robust watermark for copyright. The logo will be embedded in the green channel of the file. This watermark can be successfully extracted and it can survive against different attacks. Any manipulations...
In this paper, a wavelet domain robust watermarking technique for still images is presented. The proposed watermarking algorithm is based on 3 key aspects. First, message encoding is accomplished based on iterative error correction codes to reach channel capacity with reasonable decoder complexity. Secondly, watermark embedding is performed in the wavelet domain using a stochastically driven perceptual...
The performance of reversible watermarking is questionable due to their vulnerability to geometric attacks. Few methods are resistant to geometric distortions, most of them are vulnerable. Here we present proposed, hence forth we call it as spy pixel and size geometric distortion correction method. It improves robustness to geometric distortions. Geometric distortion correction, restores affected...
This paper presents a blind audio watermarking algorithm in wavelet domain. The proposed algorithm has high embedding capacity with very good robustness against mp3 compression and other signal processing attacks. Discrete wavelet transform is applied on non-overlapping frames and third level detailed coefficients are decomposed using QR decomposition represented in a matrix form. The R matrix of...
This paper deals with the development and assessment of a watermarking technique which is suitable for scanned PDF documents. The watermark will serve two purposes. The first one is to protect the copyright ownership. This watermark is a logo which can be extracted even if the document has gone through slight image manipulations. The second one is to authenticate the document. A slight editing in...
In the past a few years, many watermarking approaches have been proposed for solving the copyright protection problems. This paper mainly comes up with a new gray scale watermarking method in wavelet domain based on the compression pretreatment of the watermark. Through the compression of watermark, it can greatly reduce the embedding capacity of the watermark, or we can say it greatly enhance the...
A new audio watermarking algorithm based on wavelet domain transformation is being presented in this paper. The proposed algorithm follows embedding and extraction processes. In the embedding procedure, the audio signal is divided into non overlapping frames and then each frame is decomposed into 3-level wavelet transform using 4-coefficient daubechies wavelet (db4) filter. Then after using a quantization...
In this paper, we propose a binary value based progressive image watermarking approach for digital right protection. First, a new binary valued watermarking method for wavelet domain images are introduced, and then a progressive watermark detecting scheme for Internet environment is introduced. Its performance was evaluated with two types of experiments (1) robustness against image attacks and (2)...
This paper compares holographic and traditional digital image watermarking by a watermarking algorithm in DWT domain, in which the four sub images of 1-scale wavelet transformed watermark image are embedded into the four corresponding images of 2-scales wavelet transformed host image respectively. By this watermarking algorithm, test results show that the hidden images of holographic watermarking...
In this paper, the requirements, techniques and applications of digital watermarking for high-quality images were discussed. The several classes of digital watermarking techniques defined by their appearance and application domains specify the requirements and summarize the current research efforts in the image applications. An optimal watermark embedding method is developed to achieve minimum watermarking...
This paper presents a digital watermarking algorithm based on the DWT coefficients. This algorithm does not change any information of the original image, but combines the information of low frequency DWT coefficients and the watermark image. The combination is the key, which is used to extract the watermark. When we need to extract the watermark, we can obtain it by divide the key. Because the algorithm...
A new image watermarking algorithm based on normalization in wavelet domain (WNWD) robust to geometric attacks is presented in this paper. In the algorithm, watermark embedding and detecting are implemented in normalized domain. 9/7 biorthogonal wavelet is adopted to decompose the image and the watermark is embedded by modifying wavelet coefficients. When detecting, watermark is extracted by comparing...
While it has become very easy to process and store digital images effectively, it has also paved way for ease in illegal production and redistribution. Watermarking is the best way to protect digital image against illegal recording and distribution. From the literature survey, it has been affirmed that the frequency domain techniques are more robust than spatial domain techniques. In this paper a...
A region of interest dictates the most important visible aspects of an image, so distortion within these areas will be highly noticeable to any viewer. The visual attention model computes such regions in an image. In this paper, we present wavelet domain computation of the visual attention model and its applicability in wavelet-based watermarking. The proposed algorithm can embed more information...
In this paper we introduce a robust image-adaptive data hiding in wavelet domain that hide data in images while imposing minimal perceptual degradation in original image. As it is well accepted, data embedding in the low and mid frequency parts of an image have better robustness under compression attacks than high frequency parts. So our method embeds more data in low frequency coefficients than high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.