The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, an orientation and scale invariant binary descriptor is proposed, which can be used in key-points matching systems. Conventionally, a binary descriptor is generated by comparing the intensities of pixels directly, such as those in Binary Robust Independent Elementary Features (BRIEF) and Oriented FAST and Rotated BRIEF (ORB). However, comparing intensities of pixels may lose the texture...
This paper presents a modified algorithm for colour digital image watermarking. The 24 bits/pixel RGB images are used and the watermark is placed on the green channel of the RGB image. The embedding and extraction processes have been carried out using the discrete cosine transform DCT. Image normalization process has been integrated and used to improve the robustness against geometric attacks. Handwritten...
A new evaluation tool for generating attacks on watermarking algorithms is proposed. The tool is implemented for digital still images but additional attacks for audio or video can be added in the test environment continuously. The implemented tool is comprised of 23 different attacks using a graphical user interface (GUI) to open, select, attack, evaluate, and display the results of both the original...
Biometric has ever increasing demand in the field of security. However, integrity and security of biometric used to authenticate a legal user are the inherited problems of it. Since watermarking hides one form of digital data into other, its use in securing biometric data gives an added advantage. This concept has led to biometric watermarking technique in which one biometric can be embedded into...
The Gabor filters are considered one of the best image representation approaches for face recognition (FR). Researchers have exploited various configurations of Gabor magnitude as well as Gabor phase responses and their modeling with other descriptors. In this paper, we propose a novel face representation approach; Local Gabor Rank Pattern (LGRP), which exploits ordinal ranking of Gabor response images...
Symmetry is an omnipresent transformation in both nature and man-made objects. It is remarkable how human beings are capable of detecting and recognizing symmetries in the surrounding world without hesitation and without much apparent mental effort. On the other hand, teaching a machine to perform the same task has been challenging, resulting in a variety of approaches and algorithms. In this paper...
Due to the current progress in Internet, digital contents (video, audio and images) are widely used. Distribution of multimedia contents is now faster and it allows for easy unauthorized reproduction of information. Digital watermarking came up while trying to solve this problem. Its main idea is to embed a watermark into a host digital content without affecting its quality. Moreover, watermarking...
In classifying images, scenes or objects, the most popular approach is based on the features extraction-coding-pooling framework allowing to generate discriminative and robust image representations from densely extracted local patches, mainly some SIFT/HOG ones. The majority of the latest research is focused on how to improve successfully these coding and pooling parts. In this work, we show that...
In this paper, We present a blind image watermarking method based on DCT domain and independent component analysis (ICA). First of all, an approximation of cover image is created using ICA. We divide approximation image to equal 8×8 blocks and then apply DCT transform to each block. We use spread spectrum (SS) method for embedding the watermark bits. In our method a group of random bits are generated...
In this paper, we propose a novel and robust image watermarking based on the extended DCT domain, called q-DCT domain. By using the extended DCT domain, we can control the quality of the watermarked image. In our proposed scheme, we embed the watermark in the low-frequency of q-DCT domain in order to achieve the robustness of watermark. We also choose in our method a watermarking technique in the...
A novel scheme to calculate feature descriptors with rotation invariance was proposed in this paper. Unlike traditional methods of computing feature orientations and descriptors using a single sampling pattern, we calculate the orientation of a feature point with one sampling pattern and generate its descriptor with another one. Based on this idea, we present a method to generate a rotation invariant...
In this paper, we introduce and investigate a new robust blind video watermarking. Unlike some existing methods based on spatial domain watermarking techniques, the even-odd quantization algorithm is applied in our paper to embed all bit plane images decomposed from a single watermark image into only selected robust Discrete Cosine Transform (DCT) coefficients of 8×8 blocks from a host video. As a...
Image quality enhancement is a crucial requirement in many applications of digital image and video processing. Removing artifacts which are suffered from image compression will lose simultaneously image texture components. This paper combines Beltrami method and the window derivative to construct the texture map in an attempt to preserve image details during filtering artifacts. Texture map enhancement...
To make the tampered image more deceivable, rotation and scaling of the duplicated image region, as simple and common image forgery techniques, are often employed. In this paper, a novel approach of copy-move location is presented for copy-move forgery which combines with the keypoint-based method and the block-based method. For a tampered image, we use the split-half recursion matching strategy to...
A new quaternion color image watermarking algorithm is presented. Firstly, mathematical background is introduced. Then the algorithm itself is described in detail, followed by results of experiments performed to date. At the end, conclusions are drawn and areas of possible further research are indicated. The algorithm is capable of embedding an arbitrary size binary watermark in a color image of any...
Robust object recognition is a crucial ingredient of many, if not all, real-world robotics applications. This paper leverages recent progress on Convolutional Neural Networks (CNNs) and proposes a novel RGB-D architecture for object recognition. Our architecture is composed of two separate CNN processing streams - one for each modality - which are consecutively combined with a late fusion network...
Several techniques have been developed for the security of the secret data or information such as steganography, cryptography but among these the digital watermarking technique is the highly securable and imperceptible technique. In this technique, a piece of information known as watermark is hidden in the cover/host image, audio or video for the security purpose. Most of the techniques are generally...
In this paper, we propose a binary value based progressive image watermarking approach for digital right protection. The proposed method embed most watermark information into region of interest(ROI) of an image. Therefore, a client on Internet can decode the watermark while receiving the image, moreover, most watermark information would be decoded while the ROI of the image is received. In order to...
The perceptual image hashing function maps an input image to a fixed size short binary string called the perceptual hash. The perceptual image hashing has been used for image authentication, image tamper detection and digital watermarking applications. In this paper, the perceptual hash value is generated using ring partition and Discrete Wavelet Transform (DWT). An rotation-invariant secondary image...
Robustness and invisibility are all important points in video watermarking technology. In this paper, we propose the new scheme to increase the robustness and retain the invisibility as good. Through the experiment, we get the linear curve relationship between QP values and watermark strength values, and using that relationship, we get the better detection rate increased by 7%∼14%. In spite of increasing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.