The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a robust watermarking approach based on Discrete Cosine Transform (DCT) domain that combines Quick Response (QR) Code and chaotic system. When embed the watermark, the high error correction performance and the strong decoding capability of QR Code are utilized to decode the text watermark information which improves the robustness of the watermarking algorithm. Then the QR Code...
In this paper we developed a steganographic method for image protection on Facebook social network. The method hides additional information such as a logo or serial number. Uploading the images on the social network has induced image degradation on the original images. Based on the analysis of this attack we developed a method based on the discrete cosine transform — DCT where additional information...
With the advancement of technology in communication network, it facilitated digital medical images transmitted to healthcare professional via internal network or public network (e.g. Internet). Consequently, digital medical image security has become an important issue when images and their pertinent patient information are exposed to the threats, such as tampering of images to include false data which...
Nowadays microscopy confocal images are becoming more and more a fundamental tool for many application fields, including biology, forensic analysis, medicine, industrial research, etc.. Therefore, as it is easy to note, given the contexts in which such images have to operate, their protection, or at least their non alterability, is a very challenging problem in many fields. Although these problems...
In this paper, in order to control the quality of the embedded content, we propose a new domain, called q-DWT (discrete wavelet transform) for novel and robust image watermarking. We embed the watermark in the low-frequency of q-DWT domain in order to achieve the robustness of watermark. We employ the quantization index modulation (QIM) technique for embedding due to its high robustness and blindness...
Recently, the literature has witnessed an increasing interest in the study of medical image watermarking and recovery techniques. In this article, a novel image tamper localization and recovery technique for medical image authentication is proposed. The sparse coding of the Electronic Patient Record (EPR) and the reshaped region of Interest (ROI) is embedded in the transform domain of the Region of...
With a number of advantages, depth-image-based rendering (DIBR) has became an important technology in 3D displaying, as a result, more and more content-based image identification problems will turn out. Since either the center view with depth image or the synthesized virtual views could be illegally distributed, we need to not only protect the center views but also the synthesized virtual views with...
In this paper, we propose a watermarking scheme with high perceived quality for color images by using the Euclidean distance of radius-weighted mean (RWM) and centroid. Based on spatial domain, the proposed watermarking scheme can effectively embed a secret message in host images. Simulations demonstrate that the marked images generated by the proposed watermarking scheme are tolerant of versatile...
In this paper, we study the effect of an entropy model in a watermarking system on two aspects: visual information measurement and united masking function. We propose a primal sketch based visual entropy model (short for PSVEM) for the watermarking system. The PSVEM is built on both image content analysis and hierarchical perception decomposition. Experimental results show that the digital watermarking...
In this paper, an enhanced perceptual image authentication approach is proposed with extra ability of tamper localization and image self-restoration by combining perceptual hashing and digital watermarking technologies. Compared with other perceptual hashing schemes, this proposed approach could locate the maliciously tampered regions and further recover these regions to some extent. Another advantage...
A chaotic map-based hybrid watermarking scheme incorporating the concepts of the Discrete Cosine Transform (DCT) and exploiting the stability of the singular values has been proposed here. Homogeneity Analysis of the cover image has been done to chalk out appropriates sites for embedding and thereafter, a reference image has been obtained from it. The singular values of the reference image has been...
This paper deals with the image security along with compression. Here we have proposed an algorithm using chaos on EZW compression technique to provide security along with image compression. We had chosen chaos for image security due to its robustness to initial condition and mixing property. Our process of providing image security starts with compressing the image using EZW. The output sequence of...
In this paper we propose two dimensional spread spectrum watermarking framework based on Direct Spread Spectrum theory using PN sequences. The presenting schema allows acquiring a high level of robustness with desired imperceptibility. The aim of this paper was to present robust and adaptive watermarking system for multimedia protection, where hidden watermark provides a desired requisition against...
In telemedicine it is a common practice to exchange medical images between hospitals located at distant places through unsecure networks like internet. During this transfer tampers may be introduced intentionally or unintentionally into medical images. In this circumstances authentication and integrity of medical images using watermarking has become a very popular area of research. In this paper we...
We propose a new recoverable visible digital image watermarking method based on the dyadic lifting scheme. This method generates a visible watermarked image by embedding a binary logo into an image using the dyadic wavelet transform (DYWT) and interval arithmetic (IA).The dyadic lifting scheme contains free parameters that enable us to construct filters having features of the original image. Our method...
Any kind of data like image, video, audio and text are embedded with an another multimedia content is known as digital watermarking. One which is embedded is known as watermark or message and the other one is a cover or asset data. Broadcast monitoring, transaction tracking, content authentication, photograph galleries, digital libraries, real time information delivery and so on are some of the applications...
Watermarking is a recently developed technique which is currently dominating the world of security and digital processing in order to ensure the protection of digitized trade. The purpose of this work is twofold. It is firstly to establish a state of the art that goes through the existing watermarking methods and their performances. And secondly to design, implement and evaluate a new watermarking...
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in which presence of secret message cannot be detected...
The paper proposes a RGB channel based steganographic technique for images imparting better information security. This technique inserts the information into deeper layers of the selected RGB channel and the position is determined depending on the status of channel and value of the secret key. Pixels of the cover image are selected depending on the environment of the channels and hidden information...
This paper presents, a novel watermarking scheme for digital images which overcomes the problems associated with singular value decomposition. Here, the singular values of the host image are modified using the principal components of the watermark in the DWT domain for providing copyright protection as well as reliability. This method accomplishes with an incorporation of fractional singular values...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.