The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An upper bound for the smallest period of the Fibonacci module sequence is obtained, which is 6N, and more accurate and convenient than the current results. Since the smallest period of the Fibonacci module sequence is twice of that of two-dimensional Arnold transformation, the upper bound for the smallest module period of Arnold transformation is naturally 3N. It is a great advance compared with...
The central idea of this paper is to propose an innovative watermarking scheme for digital image authentication which withstands common image processing attacks. Some pixels are randomly selected from original image, so that all of them have a valid 3 × 3 neighborhoods. A binary sequence is constructed from those pixels by comparing them against average values of neighborhoods. The binary sequence...
This paper proposes a distortionless image data hiding algorithm based on integer wavelet transform that can hide data into the original image .The data can be retrieved and the original image can be recovered without any distortion after the hidden data are extracted. This algorithm hides data into one or more middle bitplane(s) of the integer wavelet transform coefficients in the LH, HL and HH frequency...
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark...
Watermarking resisting to geometric distortion is a very difficult and challenging subject. In this paper, to solve this problem, two method are proposed one method, which estimates rotation and scaling based on template embedding, has low computing complexity for template matching, one method which estimates translation based on invariant centroid has solve the translation synchronization of the...
The following topics are dealt with: linear approximation; license plate recognition; color image segmentation; image quantization; wireless video transmission; congestion control; stochastic search; transmembrane helical segments; wavelet transform; semisupervised cluster algorithm; anomaly detection; data privacy; online market information processing; user behavior; particle swarm optimization;...
Thanks to the exceptionally good properties, chaotic systems have been widely studied and developed in image scrambling and watermarking algorithms in recent years. In this paper, the chaotic standard Baker map is improved and employed to scramble the pixel positions of host image and watermark image in the preprocessing of watermarking. Experimental results show that the scrambling algorithm based...
This article is a theoretical study on binary Tardos' fingerprinting codes embedded using watermarking schemes. Our approach is derived from and encompasses both security and robustness constraints. We assume here that the coalition has estimated the symbols of the fingerprinting code by the way of a security attack, the quality of the estimation relying on the security of the watermarking scheme...
HVS theory plays important role in the application of digital image watermarking technique. When inserting watermarking, the visual masking feature of HVS could be fully used to design digital watermarking algorithm with good perceived performance. When extracting watermarking from the damaged image, human's visual feature could be combined to recover the damaged image so as to obtain better effect...
A software cloud is ready-made for software delivery or Software as a Service (SaaS). As it becomes more and more popular, security problems of software running in the cloud also become an important issue. The threats, such as destroying system softwares and access violation, are frequently emerging in the field of software cloud. In this paper, we propose a watermark-aware trusted running environment...
Based on the image edges non-changing characteristic in image format transformation, a new digital watermarking algorithm for huge index image is proposed. The watermarking information was embedded in edges by adjusting the edge pixels; therefore, the algorithm is robust against the lossless image format transformation. The experimental results show that the proposed algorithm has perfect Robustness...
Digital watermarking is an important means for copyright protection. This paper presents a fragile watermarking algorithm for copyright protection based on chaotic system. The algorithm first generates a location matrix. Then it generates the mapping image and identify the embedding location of watermarking in image blocks according to the location matrix generated first. Finally it embeds the watermarking...
Rapid growth in sharing information using internet technologies laid the threats of copyright protection for digital multimedia contents. One of the remedy for intellectual property protection is Watermarking. This paper deals with numerous available digital video watermarking techniques and raised the issue of quality and size of watermarked video. Through experimental study, it has been shown that...
This research paper discussed the usage of watermarking in medical images to ensure the authenticity and integrity of the image and reviewed some watermarking schemes that had been developed. A design of a reversible tamper detection and recovery watermarking scheme was then proposed. The watermarking scheme uses a 640×480×8 bits ultrasound grayscale image as a sample. The concept of ROI (Region Of...
This paper presents a novel approach for embedding a binary watermark into video frames based on the temporal difference and discrete wavelet transform (DWT). We embed a binary watermark in the most activity region which is obtained by the temporal difference in the approximate band at the first level of discrete wavelet transform (DWT) decomposition of video frames. Experimental results demonstrate...
In this paper, an efficient watermarking algorithm for color image is proposed based on HSI color space and Discrete Wavelet Transform (DWT). The color image is firstly converted from RGB to HSI format to obtain the intensity component. Then sub-blocks of intensity are divided and sorted according to the human visual system (HVS) characteristic. Finally, the scrambled binary watermark, which is achieved...
In this paper, a novel fuzzy support vector machine based image watermarking scheme is proposed.Since the application of support vector machine in the process of watermarking technology is only a simple classification of the image. However,the fuzzy support vector machines by selecting the appropriate degree of membership to reflect the different importance of the different sample points. In this...
A new blind geometric robust watermarking scheme is presented based on singular value decomposition (SVD) and discrete wavelet transform (DWT). In the scheme, the host image is decomposed with n-level DWT and the low frequency sub-band is divided into nonoverlapping blocks. SVD is applied to every block. The watermark is embedded into the low frequency DWT coefficients by modifying the largest singular...
Robustness against geometric distortions one of the crucial important issues in watermarking. In this paper, a new singular value decomposition-discrete wavelet transform (SVD-DWT) composite image watermarking algorithm that is robust against watermarking algorithm that is robust against processing is presented. We use DWT and IDWT transform to obtain four different frequency images. Watermarking...
In this paper, the non-uniform discrete Fourier transform (NDFT) is utilized to randomly select sampling points in frequency domain, which could make the embedding points private. Furthermore, to improve security two different chaotic maps is used. One chaotic map is used to choose the NDFT domain embedding points for making them unpredictable; the other is used to encrypt the watermark to be embedding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.