The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study presents an optimization-based image watermarking scheme by using Lagrange Principle. Unlike traditional way of single-coefficient quantization, this study uses multi-coefficients quantization to embed the watermarks. To modify the low-frequency coefficients of discrete wavelet transform (DWT), the Lagrange Principle is applied to derive an optimization-based formula. Experimental results...
Although image robust hashing has drawn many attentions as a promising image authentication technique, the tamper detection and localization of robust hash algorithm has not been explored thoroughly. The most important difficulty is the conflict that the hash value is supposed to be robust to common content-preserving manipulations (CPM), such as lossy compression, but sensitive to malicious tamper...
Embedding of the digital watermark in an electronic document proves to be a viable solution for the protection of copyright and for authentication. In this paper we proposed a watermarking scheme based on wavelet transform, genetic programming (GP) and Watson distortion control model for JPEG2000. To select the coefficients for watermark embedding image is first divided into 32×32 blocks. Discrete...
The growth of new image technologies has created a need for techniques that can be used for copyright protection of digital images, video and audio. One approach for copyright protection is to introduce an invisible signal, known as a digital watermark, into an image or video sequence. Wavelet-based watermark exploit the frequency and spatial of the transformed data in multiple resolutions to gain...
Digital watermarking techniques are used for the digital right managements and copyright protection. As known, it is a big deal in watermarking systems to make a good trade of between the robustness and imperceptibility. This paper presents a watermarking algorithm in the DCT domain using an evolutionary algorithm to satisfy both of robustness and imperceptibility. We employ a genetic-based algorithm...
Embedding watermarks into images can be referred to as a constrained optimization problem. Keeping image quality acceptable and maximizing watermark strength is more meaningful and applicable to a user than fixing strength parameter and minimizing distortion. In this paper, we propose an approach that hides watermarks in relationships between wavelet coefficients. This approach would maximize the...
To solve the security problems such as the illegal duplication, intentional alteration and copyright protection for digital images, this paper proposes a new adaptive paradigm for image watermarking based on the block Kalman filtering. The watermark was disturbed in terms of the logistic rule, and then divided into small blocks. The host image was partitioned into the same small blocks as the ones...
The natural preserve transform (NPT) has been presented as a tool for fuzzy logic watermarking. This paper describes a new image watermarking technique based on naturalness preserving transform (NPT). The proposed watermarking scheme uses NPT to encode a gray scale watermarking logo image or text, into a host image at any location. This paper presents efficient non-blind and quasi-blind watermark...
The classical approach to depth from defocus uses two images taken with circular apertures of different sizes. We show in this paper that the use of a circular aperture severely restricts the accuracy of depth from defocus. We derive a criterion for evaluating a pair of apertures with respect to the precision of depth recovery. This criterion is optimized using a genetic algorithm and gradient descent...
Blind and robust watermarking of 3D object aims to embed codes into a 3D object such that the object is not visually distorted from the original shape. An essential condition is that the message should be securely extracted even after the graphical object was processed. In this paper, we propose a novel blind and robust mesh watermarking method based on the quadric error metric. The vertices are firstly...
This paper presents in detail an analysis of the ability of data hiding capabilities. According to the human visual features, this paper uses edge degree which can be computed by log points, and combines distributed evenly degrees with sigmoid function which is adopted to describe bright hiding capability, and proposes an effective method to measure the data hiding capability. Moreover, this paper...
Steganography is a method of hiding data within a cover media so that other individuals fail to realize their existence. In this paper, a new approach for steganography in Arabic texts is proposed. The main idea is that each Arabic word may have some characters which can be extended by dasiaKashidapsila. The ranks dasialocationspsila of such characters and the inserted Kashida, construct a coding...
In this paper, a new watermarking method is presented to embed a binary watermark into an image. The proposed method uses a special type of fractal coding that its parameters are contrast scaling and the mean of range block. Also, it utilizes the fuzzy C-mean clustering to address the watermark bits. The experimental results show that the proposed method has high robustness against signal distortion...
In this paper, a novel blind digital image watermarking scheme in contour let domain with singular value decomposition is proposed. In contrast to traditional methods where the watermark bits are embedded directly on the contourlet transform coefficients, the proposed scheme is based on watermark bits embedding on the singular value of the selected blocks within lowpass subband of the original gray...
Many schemes for digital watermarking have suffered tremendous frustrations on geometrical attacks. In this paper, a new method is proposed to try to solve the difficulties. The original watermark is embedded into a standard image which is acquired through translation and scaling normalization to the host image. The standard image is divided into small blocks. After singular value decomposition (SVD)...
This paper proposes a novel spatial domain color digital watermarking scheme based on chaotic maps, and the host image is color RGB image. Using Lorenz map and the Arnold cat map encrypt the watermark signal and the embedding position of the host image each other. The color space of the color host image is first converted from RGB to YCbCr. In order to resist JPEG compression, all three watermark...
Two techniques combining associative watermarking and self-embedding are used to support the blind watermarking detection. The experimental result shows that the proposed method is robust. When the watermarked images suffered from various kinds of image-processing procedures, such as Gaussian noise and brightness, the existence of watermarks can be detected without the original image's assistance.
Some work is done to improve embedding capacity and locate tampered regions base on the prior research of fragile document watermark in this paper. And an effective fragile document watermarking algorithm is proposed. The wet paper code which adjusts the number of embedding watermark bits dynamically and takes full advantage of turnover pixels is used for embed watermark to improve embedding capacity...
This paper proposes a blind associative watermarking by applying the self-embedding technique, to solve the watermarking technique's waste of the time and space to search for and keep the original image. Form experimental results, shown our scheme has the degree of confidence of around 99% to identify if a given detection image has the watermark embedded within even though it has met with some image...
We have investigated a technique for recognising faces invariant of facial expressions. We apply multi-linear tensor algebra, which subsumes linear algebra, to analyse and recognise 3D face surfaces. This potent framework possesses a remarkable ability to deal with the shortcomings of principle component analysis in less constrained situations. A set of vector spaces can be used to represent the variation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.