The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the wide variety of copy videos, the existing video copy detection methods using single feature face great challenges, especially for video content matching, which are difficult to deal with various copy video transformations. To overcome this problem, a video copy detection method based on sparse representation of MPEG-2 spatial and temporal features is proposed in this paper. Firstly, the...
Robustness and invisibility are all important points in video watermarking technology. In this paper, we propose the new scheme to increase the robustness and retain the invisibility as good. Through the experiment, we get the linear curve relationship between QP values and watermark strength values, and using that relationship, we get the better detection rate increased by 7%∼14%. In spite of increasing...
A method of reversible video image regions of interest anonymization for applications in video surveillance systems is described. A short introduction to the anonymization procedures is presented together with the explanation of its relation to visual surveillance. A short review of state of the art of sensitive data protection in media is included. An approach to reversible Region of Interest (ROI)...
A new adaptive reversible watermarking algorithm based on wavelet lifting scheme is proposed in this letter. In the algorithm, watermarking image is embedded in the sub-band LL1 generated from 1-level wavelet lifting scheme, and the position information with small size is kept as a secret matrix, the threshold value can be adaptively selected according to the peak-signal to noise rate, such that watermarked...
In this paper, a block wise image authentication scheme using a semi-fragile watermark is proposed. The proposed scheme determines integrity of the image, detecting regions suffered some content modifications and altered region can be recovered without the original image. In the proposed scheme, the original image is divided into two regions: Region of interest ROI, which is important region that...
Improving hiding capacity and resisting compression ability is an important problem in information hiding application. In this paper, invariance of JPEG compression is analyzed firstly. Then, according to invariance of JPEG compression, an information hiding algorithm which can embed information in DCT median and high frequency coefficients is proposed. Information embedding capacity adaptively is...
Since current DCT-domain watermarking algorithm is poor self-adaptive, a new digital watermarking algorithm that combines encryption with adaptability is proposed. Before been embedding, it need to be Arnold transformed so that it can break the correlation of watermark's inter-related data, greatly increase the security of watermarking and reduce the errors may be caused in the watermark image transmission...
There are available several watermarking techniques used for data security. Digital media normally assures fairly high quality, nevertheless can be easily reproduced in a perfect form. This perfect reproducibility takes an advantage from certain point of view, while it produces an essential disadvantage, since digital media is frequently copied illegally. A solution of this problem is to embed digital...
As an important component of passive media forensics (PMF), content-based copy detection (CBCD) is appropriate for identifying piracy of digital content and preventing falsified evidence. In this paper, we propose a novel and efficient CBCD scheme for identifying different altered versions of original images. We employ singular value decomposition (SVD) and block partition to improve the robustness...
In this paper, a perceptual audio watermarking scheme for MPEG scalable lossless audio that operates directly in the compressed data is proposed. The watermarking scheme is implemented in the compressed stream by modifying the quantized coefficients to satisfy the requirements of robustness, security and imperceptibility. The watermarking procedure directly exploits perceptual frequency masking of...
Due to the widespread use of sophisticated imaging tools, digital image forgeries have already become a serious social problem. In this paper, we proposes an efficient and robust algorithm for detection of a specific category of digital image forgery known as region duplication forgery, which is done by copying a block of an image and pasting it on to some other block of the same image. The image...
The binary characteristic string is calculated from I-frame by using the semi-fragile characteristic in this paper, and the binary watermarking is generated by using the characteristic string as the encryption key. This watermarking based on the content is embedded into I-frame, which is used to distinguish whether the video content remains unchanged or not. So the integrity of MPEG-4 videos' I-frame...
This paper presents an adaptive JPEG2000 compressed domain watermarking algorithm wherein the rich codestream syntax of the JPEG2000 standard is fully utilized. Firstly, the watermark embedding location is determined by the information contents (IC's for short) of the wavelet subbands, which is defined as the numbers of bytes that JPEG2000 spends to encode corresponding subbands. Then, a reference...
Robustness is difficult to resolve in digital watermarking research, and contradicts its stealthiness. So the key of designing robust digital watermarking is selecting watermark embedding positions. Around these problems, we study the robust digital watermarking algorithm based on DWT. By wavelet transform, image smoothing based on PDE, and morphology operators (dilation and erosion), we obtain the...
Image searching and authentication have become strong requirements in the digital world. Image perceptual hashing has been proposed to meet them. In this paper, a rotation resilient image hashing algorithm is presented. In the algorithm, the position information of original image is extracted to adjust the rotation. Then the features of the image are extracted by contourlet transform. The key-dependence...
A color image watermarking scheme based on support vector regression (SVR) is proposed in this work. Considering the characteristic of human visual system (HVS), the watermark information is embedded in the luminance channel of YCbCr color space. The luminance component of original color image is partitioned into contiguous blocks. Some blocks with small variance values are selected to train SVR to...
In this paper, a novel blind data hiding technique based on quantization is proposed. Quantization is performed in a special domain which converts one dimensional signal to a 2-D one named Point to Point Graph (PPG). Basis of the method is on the separation of this domain into two portions; while, only one portion is quantized. Furthermore, in the data extraction procedure, by using the unquantized...
Many image watermarking methods have been proposed over the last decade; however, most of them only focus single or two purposes, verification of copyright and integrity. This paper proposed a multipurpose watermarking method based on blind vector quantization (BVQ) and there are three purposes, copyright protection, integrity verification, and distinguish between malicious and non-malicious manipulations,...
In this paper, a novel blind video watermarking scheme based on discrete wavelet transform (DWT) is proposed. In this scheme, DWT is performed to each frame of the original video. Then embed watermark into some high-frequency coefficients, which are selected according to certain rules, to guarantee the perceptual quality of the watermarked video. When embedding, the quantization index modulation (QIM)...
In this paper, we propose a optimization method of watermarking image based on Cort and DCT. Exploiting human visual system characteristics, our method dynamically chooses the appropriate coefficients of the intermediate frequency and watermarked locations according to different image. Experiments show that the watermarking algorithm performs well in robustness and watermarking imperceptibility.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.