Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper proposes a new vacating room after encryption reversible data hiding scheme. Both joint and separate methods are presented. The most interesting features of the proposed scheme are the two staged embedding/decoding process and the group parity based data embedding for the separate method. Other new features are introduced as well. Compared with the state-of-the-art reserving room after...
This paper revisits the recently proposed adaptive pairwise reversible watermarking scheme of IEEE Trans. on Image Processing 2016 and investigates a different pairing that favors the grouping in the horizontal direction. The horizontal grouping imposes a new prediction scheme, a different complexity measure, a new pixel selection procedure and several other adjustments. For some test images, the...
This paper proposes a technique to improve the robustness of spread spectrum (SS) audio watermarking for acoustic propagation. The appropriate embedding areas should be selected to achieve good perceptibility and high robustness. In order to improve the redundancy and robustness, the cross spread spectrum (CSS) scheme based on highly correlated cross frames is proposed which could decrease the variance...
The lack of knowledge of the transmitted codeword limits the synchronization capability of the concatenated code,consisting of a low-density parity-check (LDPC) code and a watermark code, which is used to correct nonbinary insertion/deletion errors. In order to improve the synchronization error-locating capability of the watermark decoder and further decrease the error probability of the system, an...
The high-speed computer networks have been fundamental changes in the distribution of digital data and the multimedia download sales overtake the traditional sales. In addition to advantages, there are challenges for multimedia owners which their multimedia are distributed in unsecured form. To protect the data, additional information should be send with the general information. The attack is one...
Visual Cryptography Scheme (VCS) is Image Encryption technique Which Generate Share images. An image Steganography is a technique that hide secrete message in image. First selection of image based reCAPTCHA. After that, by applying Visual Cryptography on Black and White (BW) image and generate share1 and share2. In Progressive Visual Cryptography Scheme (PVCS) System share1 hide into reCAPTCHA image...
In contrast to many image watermarking schemes, the suggested method is implemented in the JPEG compressed domain with no transcoding or decompression. Therefore, this scheme is highly efficient in real-time applications and suitable for multimedia information, which is rarely available in an uncompressed form. The proposed watermarking scheme is very flexible, and can be tailored to meet the requirements...
Copyright protection for multimedia data owners is of crucial importance as the duplication of multimedia data has become easily with the advent of Internet and digital multimedia technology. Current digital watermarking techniques for preserving the product ownership are rule-based and not directly deal with the data synchronization, therefore their decoding performance reduces significantly when...
This paper presents a new embedding strategy to extend the performance bound of spread spectrum (SS) based watermarking by introducing more imperceptible distortions measured in the mean square errors (MSE). The potential of the host is sufficiently exploited and utilized to maximize the watermark robustness. This strategy is then realized in audio watermarking by adaptively inverting the host according...
The paper aims at studying some methods of coding information in text containers. It proposes a method of embedding a digital watermark to the text that is based on biometrical characteristics of the document's author. The information capacity is defined, it is 0.02 in respect of a bit/symbol proportion. A method of checking electronic and paper documents for their authenticity and unauthorized changes...
In this paper authors proposed a secured Digital Biometric based watermarking algorithm and its hardware realization by means of Field Programmable Gate Array (FPGA). The scheme focuses on the Graph Based Visual Saliency (GBVS) technique. Biometric watermarking has been introduced for validity and ultimate security of a digital media. Biometric information which is basically fingerprint is being hidden...
In multimedia distribution platforms, one of the main challenges is to provide an efficient and accurate tracing process despite the lack of information about the colluders' strategy. Indeed, the original Tardos tracing performance is considered as suboptimal because of its agnostic behavior and conservative accusation regardless the collusion strategy. The Expectation Maximization algorithm has shown...
Digital domain is today's most preferred area for data processing and transmission. In case of data augmentation or authorized replication, copyright protection has become an exigent challenge. Digital watermarking is a conventional procedure to serve this purpose. Here a spatial domain image watermarking scheme is developed through a pixel based saliency map where the inadequate nature of human visual...
Document is unavailable: This DOI was registered to an article that was not presented by the author(s) at this conference. As per section 8.2.1.B.13 of IEEE's "Publication Services and Products Board Operations Manual," IEEE has chosen to exclude this article from distribution. We regret any inconvenience.
Document is unavailable: This DOI was registered to an article that was not presented by the author(s) at this conference. As per section 8.2.1.B.13 of IEEE's "Publication Services and Products Board Operations Manual," IEEE has chosen to exclude this article from distribution. We regret any inconvenience.
Content protection relies on several security mechanisms: (i) encryption to prevent access to the content during transport, (ii) trusted computation environment to prevent access during decoding, and we can also add (iii) forensic watermarking to deter content re-acquisition at rendering. With the advent of next generation video and the ever increasing popularity of embedded devices for content consumption,...
High embedding capacity is desired in digital image watermarking. In this paper, we propose a novel rank-based image watermarking method to achieve high embedding capacity. We first divide the host image into blocks. Then the 2-D discrete cosine transform (DCT) and zigzag scanning is used to construct the coefficient sets with a secret key. After that, the DCT coefficient sets are modified using a...
In echo-based audio watermarking methods, poor robustness and low embedding capacity are the main problems. In this paper, we propose a novel time-spread echo method for audio watermarking, aiming to improve the robustness and the embedding capacity. To improve the robustness, we design an efficient pseudonoise (PN) sequence and a corresponding decoding function. Compared to the conventional PN sequence...
Watermarking, known as a typical active network traffic analysis technique, has been widely used in stepping stone detecting and anonymity tracing. Among several different watermarking schemes, the interval centroid based watermarking scheme has shown its robustness in the problems such as chaff packet, packet drops and repacketization. It can be widely used in many applications, for it embeds watermarking...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.