The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Accompany with the growth of the speed in network, people's living standard has greatly improved, but the threaten to its information's security has also appeared, as a important branch of information security, steganography is a useful method to protect the secret information safety. In view of the high complexity of current video steganographic algorithms, and combining with the trailing coefficient...
This paper presents a robust watermarking technique to copyright an image. Proposed technique is totally based on DCT and is different from most of the available techniques. Watermark is embedded block-wise into the image to protect the ownership against the ltering, cropping and noise attack. Before embedding the watermark we are converting it into Walsh coded watermark [1]. In proposed approach...
Digital image watermarking can be considered as a better solution to protect authentication of images and its copyright protection. The purpose of proposed method is to provide better security of host image. Proposed method is implemented using DWT and DCT. Watermark image is inserted in LL sub-band of host image by dividing it using DWT. 8×8 block DCT is applied on LL sub-band and watermark is embedded...
Visual tracking is a typical issue for a mobile robot. In this paper, we propose a robust tracking algorithm which exploits perceptual image hash vector based on Discrete Cosine Transform (DCT) perceptual image hashing algorithms. We use perceptual hash vector of the target object and perceptual hash vectors surrounding the target object in a scene. The learned perceptual hash vectors are used to...
In this paper, the effect of low, middle and high frequency DCT coefficients are investigated onto gray scale image watermarking in terms of imperceptibility and robustness. The performance of Lagrangian twin support vector regression (LTSVR), which was successfully applied on synthetic datasets obtained from UCI repository for various kinds of regression problems by Balasundaram et al. [9], onto...
The chances of copyright violation and piracy have been increased due to growth of networking and technology. Digital watermark is useful to verify the integrity of the content and for authenticity of an owner. The digital watermark must be robust against various attacks in order to protect the copyright information which is embedded in the original content. The proposed algorithm is useful for protecting...
With the advent of various image processing tools, images can be easily counterfeited or corrupted. Digital image watermarking has emerged as an important tool for protection and authentication of digital multimedia content. This paper presents a robust DCT-based blind digital watermarking scheme for still color images. RGB color space has been used to decompose the color cover image into three channels...
Watermarking is an interesting technique for message hiding and authentication. We have applied 3- level Haar-DWT and thereafter, DCT transformation on each selected HH3 subband is computed. In extraction the same procedure is used to retrieve watermark logo image from the DCT component of middle frequency subband of selected HH3 subband. To ensure the accuracy and image quality between watermarked...
In this paper, we investigate the robustness achieved by hard-input hard-output (HIHO) turbo product code (TPC) in a grayscale image watermarking. The TPC scheme is based on the concatenation of a BCH product code. The general concept of the TPC is to construct two or more simple codes in order to achieve remarkable error performance. Unlike many proposed algorithms in the literature, HIHO-TPC require...
Video watermarking plays a key role in copyright protection domain of today's world. In the following paper, a blind watermarking algorithm is being proposed in which the watermark information is being embedded by little alteration of some of the value of DCT coefficients of luminance part of video during encoding it in MPEG-2 style. It is obvious that for any type of watermarking the three parameters,...
The availability of digital data such as images, audio and videos to the public is growing day by day with the expansion of the Internet. Hence preserving the rightfulness of the data is a critical factor and the solution is effectively provided by digital watermarking. Digital watermarking is a developing technology which ensures and facilitates security, authentication and copyright protection of...
Digital media production and editing technologies have led to widespread forgeries and unauthorized sharing of digital video. This paper presents a method to detect video tampering and differ it from video processing operations, such as recompression, noise, and brightness increase, using a practical watermarking scheme for real-time authentication of digital video. It can be configured to adjust...
In today's world a lot much of the intellectual work is produced and distributed in the digital form and thus it becomes very difficult to prove the ownership claim by the legitimate owner and to stop the unauthorized use of the intellectual property. Robust watermarking provides solution to this problem. In this paper, we have categorized the popular techniques of transform domain robust image-adaptive...
Robustness of image watermarking algorithms is challenged by applying various attacks on the watermarked images. One of such attacks is scaling. In this paper, we first demonstrate that structure of the scaling attack resembles that of discrete wavelet transform (DWT). Consequently, we are able to show that particular class of DWT watermarking method is robust against the scaling attack. It is shown...
In one's day to day life; internet is growing and became an important part. Digital content can easily be downloaded, copied or edited. Digital content can be secured by various ways. Digital Watermarking is one of the methods for the protection of Digital Content. Digital Watermarking is a method by which data can be secured by hiding data in any image which can work as a carrier image. The carrier...
For reliably protecting the rights of multimedia data owners, digital watermarking techniques appear to be the best solution. A digital watermark is a code which is hidden into the multimedia data for carrying information regarding the copyright. In this paper the problem of the reliable identification of the watermark, in absence of the original unmarked image, is addressed. An optimum (based on...
In this paper a method is presented for copyright protection in digital images. Copyright protection is achieved by embedding an invisible signal, known as digital signature or watermark, in the digital image. The method proposed in this paper casts the signature in the frequency domain by slightly modifying the values of randomly selected DC coefficients of the Discrete Cosine Transform (DCT) of...
In this paper we present an original way to mark images. Firstly the different techniques in watermarking are presented. In a second part our approach is outlined. It consists in searching an IFS (Iterated function systems) in the image to hide new similarities in it. In a third part two different algorithms are presented: the first uses the luminance domain, the second uses the DCT (Discrete Cosine...
Even with use of restart intervals, some residual errors remain in the decoded JPEG images after transmission. In order to improve the image quality, robust decoding techniques are useful. First, we propose error detection techniques, then error compensation and concealment techniques for the damaged blocks. Depending on the entropy coding and on the neighbourhood template, improvements between 3...
Both Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) have been used as mathematical tools for embedding data into an image. In this paper, we present a new robust hybrid watermarking scheme based on DCT and SVD. After applying the DCT to the cover image, we map the DCT coefficients in a zig-zag order into four quadrants, and apply the SVD to each quadrant. These four quadrants...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.