The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information hiding of data in an audio file is an important thing that the media can be recognized by its ownership. The hidden information would be the important information which describes the copyright of the audio file. In this research, the binary data is inserted or hidden into the audio file by multicarrier modulation technique data hiding. The encoded binary data by convolutional encoding...
Audio data hiding techniques have been applied various applications such as audio watermarking and steganography. In this paper, we propose an audio data hiding method based on the phase information of the modulated complex lapped transform (MCLT) coefficients and evaluate the performance in terms of audio quality and robustness. To embed and extract the data, the proposed technique modifies the phases...
It is a challenging work to design a robust audio watermarking scheme against various attacks. Based on wavelet moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance toward desynchronization attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly,...
Image watermarking has become an important tool for intellectual property protection and authentication. In this paper a watermarking technique is suggested that incorporates two watermarks in a host image for improved robustness. A watermark, in form of a PN sequence (will be called the information watermark), is embedded in the DCT domain of the cover image. The second watermark (called synchronization...
This paper proposes a novel content-adaptive music watermarking technique which uses the principles of music theory to enhance the capacity and robustness of watermark embedding. Using the musical concepts of key and chords, certain notes, which are musically coherent with the work, can be added or removed without impacting the listeners experience. The notes serve as the carrier of the watermarked...
Most H.264 watermarking schemes only embed the watermarks on I-frames, and are therefore extremely fragile under temporal attacks (e.g., frame dropping). To obtain the robustness under temporal attacks for H.264 watermarking systems, this paper presents a robust perceptual image hashing based temporal synchronization method. We extract robust geometric information from the 4times4 block mean map of...
A rotation, scaling and translation (RST) invariant watermarking scheme using support vector machine and image moments for synchronization is proposed in this paper. Watermark is adaptively embedded in discrete wavelet transform (DWT) domain. In order to estimate RST transform parameters, support vector machine is utilized to learn image geometric pattern represented by six combined low order image...
In this article an extension of the watermarking scheme, based on key sequence, proposed by Lin et al. is presented. This new scheme is designed taking into account the temporal modifications of the MPEG-2, MPEG-4 part 2 and MPEG4 Part 10 compressions. Besides the redundancy control of Lin is modified and the characteristics extraction process is improved. In this way, a better performance, up to...
A geometrically robust image watermarking scheme based on perceptual hashes and genetic algorithm is proposed. The synchronization information, which is generated by perceptual image hashes and pseudo-random number (PRN), and the watermark are embedded into the image based on the human visual system (HVS). In watermark extracting, the geometric transformation parameters are computed from perceptual...
Based on the method of information hiding, a novel algorithm for security speech communication is designed in this paper,and the synchronization code can be used to search the embedded location. Firstly, the DWT is performed on each segment of the original carrier audio; Secondly, the embedding bits are constructed by the synchronization code and secret audio ,and the secret bits are formed by chaotic...
In this paper, a new synchronous insertion method of the uniquely assigned RF watermark data into ATSC transmitters and translators is proposed. Watermark data is generated, VSB filtered and up-converted to the same IF or RF frequency with the target transmission system. Frequency and timing of the generated RF watermark data are synchronized with the target system by extracting synchronization information...
We propose a unidirectional communication system capable of pushing information from audio speakers to nearby audience via acoustic channels. Though constrained by short transmission distances and low data throughput of sound waves, information push services based on acoustic channels can be regarded as a cost-free message delivery scheme since music playback systems and handheld devices equipped...
In this paper, we propose a new method for damaging and destroying robust invisible watermarks using an image resizing technique which is named seam carving. By using this method we are able to resize watermarked images in a content-aware manner so that the synchronization of the embedder and extractor of watermarking system is broken and the watermark detection becomes impossible. In contrast to...
In this thesis, we present a novel audio digital watermark method based on counter-propagation Neural Networks. After dealing with the audio by discrete wavelet transform, we select the important coefficients which are ready to be trained in the neural networks. By making use of the capabilities of memorization and fault tolerance in CPN, watermark is memorized in the nerve cells of CPN. In addition,...
Wireless sensors typically operate in uncontrolled and possibly hostile environment. Thus, sensors have a high risk of being captured and compromised by an adversary. Traditional security schemes are computationally expensive, because they introduce overhead which shortens the life of the sensors. Watermarking schemes are usually light weight and do not require extensive computing and power resources...
Recently, much interest is being taken to protect the copyright of digital data and prevent illegal duplication of it. Towards this purpose, this paper presents a robust and flexible blind watermarking system suitable for proving ownership claims for 3D models. The basic idea is to decompose the original model into a series of details at different scales by using particular basis functions derived...
One of the challenges in blind watermark detection is synchronization. Synchronization is the process of identifying the coordinates of an embedded watermark and is crucial in successful watermark detection. If the detectorpsilas input is watermarked but synchronization fails, then the embedded watermark will not be detected. In this paper, novel video watermarking algorithm is proposed basing on...
Wireless sensors typically operate in uncontrolled and possibly hostile environment. Thus, sensors have a high risk of being captured and compromised by an adversary. Traditional security schemes are computationally expensive, because they introduce overhead which shortens the life of the sensors. Watermarking schemes are usually light weight and do not require extensive computing and power resources...
Biometric watermarking refers to the incorporation of biometrics in watermarking technology. In this paper, we present a novel biometric watermarking scheme to embed handwritten signature invisibly in the host as a notice of legitimate ownership. We propose to adaptively fuse Least Significant Bit (LSB) and Discrete Wavelet Transform (DWT)-based approaches into a unison framework, which to be known...
Digital watermarking is a method for embedding secret data into digital signals. We present a novel service that uses watermarking to add metadata into radio broadcast music. A user can record the music with a mobile phone from radio loudspeakers and extract the watermark. The watermark can contain, for example value adding metadata about the song or a link to an external server that can provide the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.