The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The present study is conducted in two phases. In the first phase we analyze the different aspects of gray image watermarking in a colored host. Robustness and imperceptibility are used as analysis parameters. The approaches explored and compared in this study are — watermark embedding with any one of the three RGB (Red-Green-Blue) components (single channel embedding), multichannel watermark embedding...
In this paper, the authors propose a digital watermarking scheme for gray-scale images, in which, coefficients of a host image are quantized in the wavelet domain. In particular, the binary watermark image is embedded into the wavelet-blocks that can be obtained by grouping four coefficients at different sub-bands at corresponding coordinates. The modification of only two coefficients at the LH4 and...
A new robust digital watermarking technique with an aim of image protection is proposed. This technique incorporates both the transform and feature based method. Initially, the Harris Laplacian detector extracts the features from the cover image that suites well for the watermarking. The extracted characteristic regions are grouped to form a primary feature set where the secret message is embedded...
This paper proposes the software watermarking algorithm based on Chinese remainder theorem, and introduces the authentication center to certify the watermark, to solve the problem that equation re-sorting algorithm are easily attacked by the random re-sequencing technology. The algorithm further disposals the sequence obtained, the selected divisor sequence and the multiple to generate the key, which...
Watermarking databases is an emerging technological interest, especially within the frame of a vastly growing number of publicly available web-databases. In order to ensure integrity, detect malicious modification and protect ownership rights, we propose a watermarking algorithm based on parameterized tuple partitioning and whitespaces, using a public watermark. The watermarking scheme is non-intrusive,...
In this paper, a blind robust watermark approach for authentication 2D Map based on random table and polar coordinates mapping is presented. Firstly, All vertices will mapped into polar coordinate system. Then, the watermark is embedded using the random table of the decimal valued of the polar coordinates through the digit substitution of the decimal part. Theoretical analysis and excremental results...
To protect copyright of audio signals several watermarking algorithms have been proposed in recent years. Many of them are based on wavelet transform but these methods are not robust enough against signal processing attacks. This paper presents a new audio watermarking algorithm based on Hybrid wavelets and Directional Filter banks (HWD) and Singular Value Decomposition (SVD). The proposed method...
This paper deals with real time video watermarking using Singular value decomposition (SVD). The last part of the paper describes experiments conducted on the proposed watermark embedding method. The goal of these experiments was to test the robustness of the method presented in the paper against several watermarking attacks.
We propose a system to embed watermark message into audio signal, which can be used for copyright protection. It uses spread spectrum theory to generate a watermark that resistants to different removal attempts. We exploit the psychoacoustic auditory model to guarantee the audio signal's perceptual quality after the watermark embedding procedure. Recovery is performed without knowledge of the original...
This paper presents a blind spread spectrum watermarking algorithm in discret cosine transform (DCT) domain based on chaotic sequence features for still image. We used logistic map with two secret keys; one to generate a spread spectrum sequence and other to determinate the secret insertion positions of the mark; the insertion of the mark was done in the middle frequency of DCT of the image to be...
This study presents an optimization-based image watermarking scheme by using Lagrange Principle. Unlike traditional way of single-coefficient quantization, this study uses multi-coefficients quantization to embed the watermarks. To modify the low-frequency coefficients of discrete wavelet transform (DWT), the Lagrange Principle is applied to derive an optimization-based formula. Experimental results...
This paper considers a digital watermarking based on the modification of color image pixels, and proposes an improving method to improve its performance. Conceptually, in the watermark embedding process, an image averaging technique is considered and used to reduce the variation of pixel values, while in the watermark retrieval process, an tuning technique is implemented in the original pixel prediction...
Embedding of the digital watermark in an electronic document proves to be a viable solution for the protection of copyright and for authentication. In this paper we proposed a watermarking scheme based on wavelet transform, genetic programming (GP) and Watson distortion control model for JPEG2000. To select the coefficients for watermark embedding image is first divided into 32×32 blocks. Discrete...
Ensuring watermark invisibility in digital images is a challenging task. Most watermarking techniques empirically adjust a strength parameter in order to reach the best trade-off between invisibility and robustness. A target PSNR value is typically set in order to reach a defined quality level. Some watermarking techniques exploit local activity to increase the watermark strength in some specific...
The growth of new image technologies has created a need for techniques that can be used for copyright protection of digital images, video and audio. One approach for copyright protection is to introduce an invisible signal, known as a digital watermark, into an image or video sequence. Wavelet-based watermark exploit the frequency and spatial of the transformed data in multiple resolutions to gain...
It is a challenging work to design a robust audio watermarking scheme against various attacks. Based on wavelet moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance toward desynchronization attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly,...
Digital watermarking techniques are used for the digital right managements and copyright protection. As known, it is a big deal in watermarking systems to make a good trade of between the robustness and imperceptibility. This paper presents a watermarking algorithm in the DCT domain using an evolutionary algorithm to satisfy both of robustness and imperceptibility. We employ a genetic-based algorithm...
The popularity of multimedia service over Internet has created the needs for efficient digital right management technology. In recent years, many researchers have focused on how to protect and control multimedia contents from the unauthorized usage. In this paper, we propose a fast and reliable digital right management algorithm based on digital watermarking for real time video contents protection...
Embedding watermarks into images can be referred to as a constrained optimization problem. Keeping image quality acceptable and maximizing watermark strength is more meaningful and applicable to a user than fixing strength parameter and minimizing distortion. In this paper, we propose an approach that hides watermarks in relationships between wavelet coefficients. This approach would maximize the...
To solve the security problems such as the illegal duplication, intentional alteration and copyright protection for digital images, this paper proposes a new adaptive paradigm for image watermarking based on the block Kalman filtering. The watermark was disturbed in terms of the logistic rule, and then divided into small blocks. The host image was partitioned into the same small blocks as the ones...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.