The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The main aim of this paper is to design and implement robust and novel watermarking scheme for H.264 encoded videos. The method used for watermarking is multi resolution wavelet decomposition. The watermark used is a binary image. This watermark is embedded in the wavelet coefficients of the LH, HL and HH sub-bands of the third wavelet decomposition level by quantization. We have tested the resilience...
A robust and high quality image watermarking method has high demand for protection of copyrighted multimedia data over internet. The existing image watermarking methods generally exploit the correlated color models due to which only one color component at a time can be used for embedding the watermark. Therefore, in this paper, a novel steerable pyramid transform (SPT) based digital image watermarking...
The development of the sensor networks has enabled increasing commercial or scientific applications in which data are available as streams. And sometimes the core security requirement of streaming data in WSNs is integrity rather than confidentiality. Former stream authentication schemes based on watermarking usually suffer from the vulnerability of grouping. This paper proposed a novel integrity...
Digital watermarking is a process of embedding watermark signal with its host image to prove its authenticity. In this paper, Embedding and extraction process are applied on the higher frequency domain of Discrete Wavelet Transform (DWT). Using DWT prior to the Discrete Cosine Transform (DCT) provides improved imperceptibility and higher robustness against Signal processing attacks. Arnold transformation...
Xing et al. proposed a digital watermarking scheme based on visual cryptography and the extended codebook in order to eliminate ambiguity problem. However, there exists still an ambiguity problem such that the watermark can be extracted from other owner's watermarked image. In order to solve this problem, we propose a new digital watermarking scheme with authentication. The proposed scheme is based...
In this paper, a wavelet based scheme for digital image watermarking is presented. This proposed scheme inserts two watermarks in an image which serves two different purposes. The first one is inserted using blind watermarking technique while second one acts as fragile watermark. As it is blind watermarking technique, there is no need of original image at the time of watermark extraction. The insertion...
Video watermarking is a novel technology that has the ability to solve the problem of illegal digital video manipulation and distribution. In video watermarking, the copyright bits are embedded into video bit streams. This paper proposes two effective, robust and indiscerniblevideo watermarking algorithms. Both the algorithms of video watermarking are based on algebraic transform of Singular Value...
A lossless digital watermarking scheme, which was zero- perturbation on the content and graphics for the digital image maps, is proposed. During the simulation, the scheme has been utilized to model the copyright protection program as a commerce application. Compared to the traditional digital watermarking schemes, our scheme operates in redundancy areas of maps and is scalable to topology changes...
This paper proposes effective digital watermarking scheme to hide information in binary image. The original image is not needed when retrieving the digital watermark and a key is used to protect the hidden information. In order to produce little annoying noise as possible to the binary image, this scheme uses the features of Human Visual System in binary image. Finally we give details on how to implement...
The impeccability (quality) represent as one of the most important requirements of any watermarking system of the watermarked gray scale image. In most studies, the watermarking algorithm has to embed the watermark so that this will not affect the quality of the host data. In this study, the method concentrates on the greatest quality of the watermarked image based on Dual Intermediate Significant...
In this present work a wavelet based watermarking technique is discussed. The proposed method transforms the image into wavelet coefficients by using DWT. A Simplified Significant Wavelet Tree (SSWT) is formed with wavelet coefficients (other than at lowest level) at higher level subband descending towards lower levels. The proposed scheme quantizes the SSWT coefficients to embed a bit of watermark...
Developing a watermarking method that is robust to cropping attack is a challenging task in image watermarking. The moment-based watermarking schemes show good robustness to common signal processing attacks and some geometric attacks but are sensitive to cropping attack. In this paper, we modify the moment-based approach to deal with cropping attack. Firstly, we find the probability density function...
An adaptive compressed domain watermarking method is proposed in the paper. In this technique, multiple binary images derived from a single watermark image are first embedded in a video sequence. The spatial spread spectrum watermark is directly incorporated in the compressed bit streams by modifying the wavelet coefficients. Experimental evidence demonstrates that the developed approach is efficient...
In this paper, we propose a scheme to protect the region of interest (ROI) in the scalable video coding (SVC) with watermark. By embedding watermarks only in ROI, the most important contents of video are protected and less important areas are not touched, so the video protection is more efficient with less computing cost. In our scheme, ROIs in the video are detected and extracted automatically. Different...
Without modified cover text, zero-watermarking technology makes steganalysis technology is completely ineffective. However, as far as the resilient of active attack, there's no deep study currently. In this paper, the text zero-watermarking algorithm based on chaotic map, which has a better robustness, is regarded as the attack target. By synonym substitution, two kinds of attack methods: Sync-attack...
A rotation resistant image watermarking algorithm is proposed to solve digital image watermarking extracting difficultly when rotating with any angle. The algorithm firstly deal watermarking with binary serialization, and then divide the source image into several circle area with the center point of the image, segment the circle area according to length of the binary watermarking sequences with certain...
Considering the robustness and imperceptibility of digital image watermarking, this paper proposes an watermark embedding algorithm, in which watermark is embedded in DC coefficients derived from a dual DCT transformations. After block based DCT transformation, DC coefficients of an image are arranged into a new matrix, on which block based DCT transformation is performed again. Through abound empirical...
In Digital Asset Management systems, media is often handled in compressed and encrypted form. In this paper, we propose a novel partially compressed-encrypted robust MP3 audio watermarking technique. However, arbitrary embedding of a watermark in a partially compressed encrypted MP3 audio can cause drastic degradation of the quality as the underlying change may result in random decrypted values. In...
An algorithm of digital watermarking based on hyper chaos sequence and the discrete fractional Fourier transform (DFRFT) is proposed. First, the watermark image is scrambled in the spatial domain. The original image and the watermark image are discrete fractional Fourier transformed respectively with different order. Secondly, the watermark image's real part and imaginary part are encrypted by the...
This paper compares two objective audio quality assessment measures calculated for three watermark methods with its corresponding subjective measures. The aim was to see if these measures could be used to estimate the subjective quality of audio with various watermarks. The subjective quality was measured with MUSHRA. Samples were watermarked with the direct spread-spectrum, the echo hiding, and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.