The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel robust video watermarking scheme is proposed in this paper, in which crowdsourcing technique is used to extract the most important regions from the original video. In fact, these regions are obtained by interacting with users and analyzing their behaviors while using an interactive interface where the summaries of the videos are given. The obtained regions are then detected in the mosaic frame...
A comparative analysis to determine the most effective video watermarking algorithm between SVD/DWT hybrid and Singular Value Decomposition (SVD) is reported in this paper. Blind video watermarking schemes are simulated and attempts made to recover the watermark after some signal processing attacks such as median filtering and Histogram equalization. The quality of the extracted watermark was then...
In this paper, different types of image watermarking techniques, the embedding of data or copyright information into the data file, are investigated. Three image watermarking techniques are discussed, namely: least significant bit, least significant bit and discrete cosine transform combined, and discrete cosine transform and discrete wavelet transform combined. These embedded watermarking techniques...
In recent years, due to the development of computer, internet and mobile technologies the copyright protection of the multimedia documents such as digital audio, image and video has become important. Digital watermarking has become the most popular method for protecting multimedia documents. In this work, a novel robust image watermarking method based on Discrete Cosine Transform, Discrete Wavelet...
Video steganography is a technique used for secret communication. In video steganography, the secret information is concealed in a video file. An MP4 video steganography method that hides audio and image data in wavelet domain is proposed in this paper. A video file consists of I-frame, P-frame, and B-frame. An I-frame, or intra frame, is decoded independently without referencing other frames. P-frames...
In this research, we proposed the audio watermarking system with adaptive multilevel DWT (discrete wavelet transform) — SVD (singular value decomposition) based on BCH (Bose-Chaudhuri-Hocquenghem) code. The host audio signal is embedded with a watermark signal in the form of an image signal accompanied by several attacks on the watermarking system. The results showed that the perceptual quality of...
In this paper, a robust image hashing framework is proposed using image normalization, discrete wavelet transform and singular value decomposition. The stressed motive of the proposed scheme is to obtain a randomize hash sequence which can be used for image authentication and database search. For this purpose, the image is first normalized followed by hash generation in the wavelet domain utilizing...
The main issue in the digital content marketplace is copyright protection of digital content. Sometimes the digital information may copy or alter during transmission. Thus, there is a need to develop an authentication method, which is very effective to protect the digital data. There are different watermarking techniques, which use different transforms. In this paper, a Discrete Wavelet Transform...
This paper proposed a hybrid method that had been solved both of these issues. We proposed a combination of Discrete Cosine Transform (DCT) and Haar Wavelet Transform (HWT) due to achieved imperceptibility and robustness comes from PSNR and NC value. Firstly, HWT applied in host image and then selected subband LL. LL subband will be divided into an 8×8 matrix in which each matrix was applied using...
Audio Steganography is the technique of hiding any secret information behind a cover audio file without impairing its quality. Data hiding in audio signals has various applications such as secret communications and concealing data that may influence the security and safety of governments and personnel and has possible important applications in 5G communication systems. This paper proposes an efficient...
With the expansion of digital world, the scope of copyright has started facing a great threat. Thus, there is a need to protect the original work from being copied or distributed illegally. Image watermarking plays a very important role in solving this issue. Image watermarking is the procedure to embed a particular piece of information (watermark) in an image such that it is not distorted. Thus on...
In this era of internet, protection of digital images has become an important concern. Digital image watermarking is a scheme that has been developed to protect confidential digital images from illegal copy and manipulations. There are various methods of watermarking but to achieve good imperceptibility and robustness, a combined image watermarking algorithm based on Integer Wavelet Transform (IWT)...
Automated ECG signal processing can assist in diagnosing several heart diseases. Many R peak detection methods have been studied because the accuracy of R peak detection significantly affects the quality of subsequent ECG feature extraction. Two important steps in R peak detection algorithm that draw attention over researchers are the preprocessing and thresholding stages. Among several methods, wavelet...
A new digital image multi-watermarking approach is proposed. Firstly watermark is synthesized by composing, conversion and scrambling of original multiple watermarks. Then watermark is embedded in middle frequency sub-bands of host image in wavelet domain, and the embedded intensity of watermark is determined adaptively by noise visibility function. Finally, extraction process adopts independent component...
A novel method is proposed which deals with secure extraction of data by utilizing transform based image watermarking techniques. The image is embedded with a watermark using a combination of Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) in this scheme. The conventional transforms are applied in an optimized mode in these schemes in different...
Image retrieval technology allows doctors to query diagnosed images which are similar to the current diagnostic image from large medical image library, and then doctors develop accurate treatment programs and reasonable clinical diagnosis. However, medical image data may be leaked and tampered with during the transmission of the Internet, resulting in data security issues. Therefore, this paper proposes...
The telemedicine is a medical practice which consists in using new technologies of information and communication (NTIC). It makes it possible to facilitate the transfer and diagnosis of several medical data at distance. The security of medical images plays an important role to ensure and guarantee the integrity and confidentiality. This paper presents a robust multiple watermarking which combine discrete...
The current paper proposes a novel scheme for non-blind watermarking of images, making use of discrete wavelet transform (DWT), discrete time Fourier transform (DTFT), as well as singular value decomposition, or SVD. During the process of embedding, 1-level DWT is used to decompose the host image into its various frequency sub-bands. After this, the high-frequency sub band receives an application...
In this work, a new image watermarking algorithm on colour images is proposed. The proposed algorithm divides a cover image into three colour bands of red, green and blue. Then the following tasks are done on all three channels separately. First, Each colour band is divided into patches of small sizes then the entropy of each patch is calculated. At this step a threshold is found based on the average...
In this paper we have proposed a new image watermarking technique which consists in applying the Singular Values Decomposition (SVD) in LWT domain in order to insert the watermark image in the cover image. This technique also use signature in the embedding and extraction procedure. The obtained results from the application of the proposed technique on a number of images show clearly that this technique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.