The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many watermark algorithms exist for the frequency domain using either the DCT or the DWT. In this paper, we propose a new watermark algorithm using the DWT prior to the DCT to provide better imperceptibility in harmony with the human visual system, and higher robustness against signal processing attacks. Experimental evaluations show that the technique performs well.
Lossy compression is inherently contradictory with watermarking and makes the watermark retrieval unreliable. In this paper, we propose a watermarking technique capable to correctly retrieve watermark in both image and video, where watermarking is combined with JPEG/MPEG compression standards to adaptively obtain a proper trade-off among imperceptibility, achievable embedding capacity and robustness...
The robustness of classification of isolated phoneme segments using generative classifiers is investigated for the acoustic waveform, MFCC and PLP speech representations. Gaussian mixture models with diagonal covariance matrices are used followed by maximum likelihood classification. The performance of noise adapted acoustic waveform models is compared with PLP and MFCC models that were adapted using...
Image watermarking is gaining more popularity due to the wide use of internet and multimedia applications. Image watermarking adds additional information about host image in the form of logo/audio/video or text. Main aim of watermarking is to provide copyright protection, Content authentication, Ownership identification, data integrity. Watermarking does not only protect content from modification...
In this paper, we utilized the relationship between two blocks to generate the robust feature. Such a feature is very stable under various image processing operations. The XOR operation is applied to the feature and the watermark to create the secret key. Moreover, a mechanism is developed to resist the cropping attacks. The experimental results demonstrate our technique is highly robust against image...
The objective of Digital Watermarking is to provide security in terms of information hiding and copyright protection. The researchers are continuously working to create robust digital image watermarking methods. In this paper proposed a novel technique for RGB digital watermarking based on 2-Discrete Cosine Transform (DCT) with discrete wavelet transform (DWT) algorithm. For this use of two images-...
The technique used to hide copyright information (watermark) into the digital audio signal is termed as audio watermarking. Audio watermarking is an excellent approach to provide a solution to mitigate challenges that occur from easy copying and distribution of audio files that are being downloaded or uploaded through the web. The audio watermarking algorithms proposed earlier were implemented by...
In Advanced Video-based Surveillance (AVS) applications, if AVS video sequences have to be used as proofs on a legal basis it is important to verify the identity of the content originator, and whether the content has been modified or falsified since its distribution. These requirements have been until now satisfied by using digital signatures and cryptographic algorithms. However, digital watermarking...
In this paper we address the problem of robustly embedding 64 bits into an image while taking into account the H VS. The proposed method is general in that any mask can be adopted. The main advantage of the framework we present is that we demonstrate how to optimally embed a watermark given the constraints imposed by the mask in the spatial domain. This is in sharp contrast with the bulk of publications...
In this paper we propose a spatio-temporal digital video hashing scheme. In the proposed scheme, the digital video is treated as a three dimensional signal. Edge Orientation Histogram (EOH) is computed for each frame in the digital video, then a temporal discrete cosine transform (DCT) for the magnitude of each EOH bin is computed. A subset of the resulting DCT coefficients are then pseudo-randomly...
Fragile watermarking is discovered for authentication and content integrity verification. This paper introduces a modified fragile watermarking technique for image recovery. Here we can detect as well as recovered the tampered image with its tampered region. This modified approach helps us to produce resistance on various attacks like birthday attack, college attack and quantization attacks. Using...
In the digital watermarking with DCT method, the watermark is located within a range of DCT coefficients of the cover image. In this paper a new method is proposed by using a combination of the DCT and PCA transform in order to use the low-frequency band for the color image. First, the digital color image is transformed into YCbCr from RGB color space and the luminance (Y) component is divided into...
Watermarking in wavelet domain and with SVD is popular due to its robustness. In this paper a watermarking technique using DCT wavelet and hybrid DKT-DCT wavelet along with SVD is proposed. Wavelet transform is applied on host and SVD is applied on watermark. Few singular values of watermark are embedded in mid frequency band of host. Scaling of singular values is adaptively done for each channel...
Digital watermarking is one of the prominent method to prevent illegal copying and duplication of digital media. It is the process of hiding digital data in any form of multimedia data such as image, audio, video, etc. This paper proposes a new block based watermarking technique in transform domain which uses cryptographic methods for embedding the watermark This method uses the MD5 hash of the cover...
In this paper, it is presented that a new color image watermarking algorithm based on compressed sensing theory and chaos theory in discrete cosine transform (DCT) and singular value decomposition (SVD) domain. Initially, a color watermarking image is preprocessed by four steps i.e. Being divided into red, green and blue channels, being sparse by wavelet transform, scrambling by 1-D chaos sequence...
Digital watermarking is a fast growing research area nowadays. An invisible signal called watermark is added into the cover data. Using this watermark, many security services can be provided to host data e.g. illegal copying of data can be avoided, any tempering with the data can be stopped and unauthorized users misusing the data can be caught along with other securities. In this paper, robustness...
The paper proposes a new image watermarking technique for digital media that can embed a specified watermark image in the cover image without affecting the imperceptibility and increase the security of watermarks. Watermarking techniques based on DCT (Discrete Cosine Transform) and Wavelet Transform are studied, whereas by using wavelet packet transform the robustness of the technique can be achieved...
In this paper, we present a simple yet effective visual tracking algorithm with an appearance model based on 2D discrete cosine transform (2D-DCT) representations. The DCT has the properties of decorrelation and energy compaction, and is robust against geometry and illumination changes. Hence, it is suitable for appearance modeling and the features of our appearance model are extracted from an optimized...
3D video provides an immersive experience to viewers and is getting more and more popular. The solution to create 3D video from 2D video is low-cost compared with that captures 3D video directly, and the generation of depth map from 2D video is a key in the 2D-3D video conversion systems. Therefore, protection of depth map is vital for 3D video. In this paper, a digital blind watermarking scheme based...
Nowadays images have been easily reproduced and distributed globally very fast. For the copyright protection, the copy detection is an important issue. Any modification on image copying processes can be viewed as attacks. The attacks include adding some small information as well as modifying images. In addition, the content-based copy detection techniques are relied on the image properties which could...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.