The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The robustness and invisibility is the most important evaluating indicator of digital watermarking system. Besides, the data that must be analyzed and calculated is large for the video watermark. Thus, for the video watermark, watermarking algorithm should not only have strong robustness but also have low time complexity. In this paper, we put forward the idea to implement a frequency domain digital...
In contrast to many image watermarking schemes, the suggested method is implemented in the JPEG compressed domain with no transcoding or decompression. Therefore, this scheme is highly efficient in real-time applications and suitable for multimedia information, which is rarely available in an uncompressed form. The proposed watermarking scheme is very flexible, and can be tailored to meet the requirements...
Telemedicine enables expert diagnosis and better healthcare access to distant patients especially in remote or rural areas by allowing the transmission of medical images through telecommunication. Privacy of data being transmitted and the underlying technologies raise issues related to security. The paper proposes an algorithm for digital watermarking of medical images to ensure secure and confidential...
Solar panels outer surface inspection is among the most challenging tasks which burden the solar plants supervisors. An automatic inspection based on image processing ensured by robots seems beneficial. In our approach, a robot equipped with an HD camera and a processing unit browses a set of solar panels (placed alongside). Afterward, the robot captures a series of successive images containing a...
According to time, so many researches have been proposed on invisible multiple watermarking. Basically, invisible video watermarking is the technique to hide relevant information into another host image, audio, text, and video. In this paper, invisible watermark is embedded by using DWT, LSB, DCT and Mojette. These techniques are based on some numeric parameters like PSNR (peak signal to noise ratio),...
This paper proposes a new image watermarking scheme based on Generalized Singular Value Decomposition (GSVD). This image watermarking method embeds the principal components of watermark image into the host image using a specific scaling factor to control the imperceptibility and robustness aspects. Using this strategy, the GSVD-based image watermarking has ability to avoid the false positive problem...
Digital watermarking is a technique that can be utilized for authenticity verification or for the copyright protection of digital data. The finality to which the technique will be utilized is that determines if the method of watermarking must be fragile or robust. The robust watermarking schemes are usually utilized for the copyright protection, so, these schemes must be resistant to attacks. To obtain...
This paper elaborates an algorithm of robust image watermarking schema which is focus on embedding RGB watermark into RGB color image. The algorithm is based on discrete wavelet transform (DWT), discrete cosine transform (DCT) and chaotic system. The schema applies a self-adapted watermark image, according to the color image R, G, B components of the lightest weight selection. Watermark image is encrypted...
The explosive progress and innovations in technology and internet has made information access easy through mediums such as mobile devices. Manipulating this information has become easy over the years through simple keystrokes and clicks which has led to need of security and authenticity of host data. Video plays a major role in multimedia exchange. The video files undergo various attacks that can...
A new multiple watermarking scheme for medical images which is based on spatial and discrete cosine transform domains is developed. In this scheme, the radiologist can specify the regions of interest to be avoided during embedding. Two watermarks are embedded where the first one is robust for ownership protection and the second one is fragile for source authentication. In order to increase data robustness,...
With the aid of Internet technology, multimedia information can be shared with ease over the public networks. This circumstance, however, creates problems of data security. Thus, watermarking or data hiding has become crucial to protect the Intellectual property rights. This paper proposed watermarking scheme for copyright protection based on DCT domain incorporated with HVS characteristics. The proposed...
This paper proposes a hybrid robust image watermarking scheme based on three levels of Discrete Stationary Wavelet Transform (DSWT) in the Discrete Cosine Transform (DCT) domain. The host image colors (red, green and blue) are separated, and then the DCT is applied on each color after separation. The DSWT is utilized to divide the DCT output into four sub-bands (3 levels). These sub-bands are (A,...
Watermarking is a copyright protection technique that embeds information imperceptibly into digital content. Watermarking is generally assessed on the basis of content quality, robustness, and data capacity. In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria) committee of Japan. This committee annually conducts watermarking...
Invisible Image Watermarking is secret embedding scheme for hiding of secret image into cover image file and the purpose of invisible watermarking is copyrights protection. Image Watermarking have research challenges for increasing robustness against visual attacks and statistical attacks. Wavelet transformation based Image Watermarking techniques provide better robustness for statistical attacks...
In this paper, a digital image watermarking method in YCoCg-R color space is proposed that uses YCoCg-R color space as a new working environment and coefficients Relation for watermark bits embedding. In the proposed algorithm, in order to pseudo-random selection of the blocks to watermark embedding and spread the distortions of watermarking, the Y channel of the host image is scrambled by Arnold...
Web resources protection is one of the most difficult problems on network. Many solutions relevant have been put forward and some protecting systems have come out until now. However, almost all solutions are based on the method that compares with files' digital signature firstly and judges files have been tampered with or not secondly [1]. And all these solutions are useless for resolving misusing...
In the past decade, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The performance of any steganographic algorithm relies on the embedding efficiency, embedding payload, and robustness against attackers. Low hidden ratio, less security, and low quality of stego videos are the major issues of many existing steganographic...
Binary descriptors have been very popular in recent years. One reason is that the algorithms that use them become computationally and memory-wise efficient. Furthermore, they tend to have some inherent robustness against some geometrical variations and against various brightness changes. These changes might result from both internal factors and external factors such as location of the light source,...
Watermarks are used to protect the copyright of multimedia and help us to identify legitimate ownership. Imperceptibility and robustness are always prime concern for the watermarking researchers. Therefore, a simple but effective blind watermarking scheme would be what we expect. In this study, we present a kind of blind watermarking technique, which is based on inter-blocks estimation of the discrete...
Increasing demand and utilization of telemedicine require transmission of medical information and images over internet. Since authenticity of received images is crucial and patient's information should be included with minimum changes in images, robust watermarking schemes are needed. In this paper, we propose a robust watermark method that embeds patient's information outside the region of interest...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.