The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new watermarking algorithm for still images is presented in this paper. The watermark is embedded in magnitude of the DFT domain and introduces image changes that are invisible to the human eye. It is robust to compression, filtering, cropping, translation, rotation and scaling. The detection algorithm does not require the original image. The watermark has a self-similar structure that accelerates...
A novel method for image authentication and tamper proofing is proposed. A binary watermark is embedded in a grayscale or a color host image. The method succeeds in detecting alterations made in a watermarked image. The proposed method is robust against high quality lossy image compression. It provides the user not only with a measure for the authenticity of the test image but also with an image map...
Watermarking in wavelet domain and with SVD is popular due to its robustness. In this paper a watermarking technique using DCT wavelet and hybrid DKT-DCT wavelet along with SVD is proposed. Wavelet transform is applied on host and SVD is applied on watermark. Few singular values of watermark are embedded in mid frequency band of host. Scaling of singular values is adaptively done for each channel...
Some video watermarking methods have been proposed that embed information into compressed video streams. When the compression scheme is an MPEG2-Video, its codes are almost pre-defined by using the coding tables, and therefore, information embedding in the compressed stream is possible by substituting some of the codes. On the other hand, HEVC/H.265 uses a kind of arithmetic coding (CABAC [5]) and...
In most of the document images, there are segments containing variations of generatable and non-generatable information content. Hence, variable amount of watermark can be applied to these segments of the document image. This could reduce the time required for embedding the watermark. In this paper, a novel intelligent robust watermarking scheme is proposed that intelligently embeds the watermark...
The main aim of this paper is to design and implement robust and novel watermarking scheme for H.264 encoded videos. The method used for watermarking is multi resolution wavelet decomposition. The watermark used is a binary image. This watermark is embedded in the wavelet coefficients of the LH, HL and HH sub-bands of the third wavelet decomposition level by quantization. We have tested the resilience...
Recently, information hiding in human skin regions has improved robustness of image steganography and yield better imperceptibility. In this paper, we present a skin-tone block-map algorithm for hiding data in colored images. A skin-tone map is generated from the host image using a skin-tone detection algorithm that is based on the pixel color information. The skin-tone map is then converted to a...
Most of the camera identification methods work in batch mode. However, in many applications, there is just one image from the resource. In addition, previous proposed camera identification algorithms are prepared to classify the sources for a specified compression quality factor. In contrast, the compression qualities of the image may be changed during further processing and tampering. In this paper,...
In this paper, a novel hash-based image content authentication scheme for tamper detection and localization is proposed. The original image is divided into sub-blocks whose size can be tuned with the accuracy of tamper localization, and the measurements which are obtained in the compressed sensing (CS) process contain all the information of the subblocks. Moreover, singular value decomposition (SVD)...
This paper presents a robust watermarking for still digital images based on Fast Walsh-Hadamard Transform (FWHT) and Singular Value Decomposition (SVD) using Zigzag scanning. In this paper, after applying Fast Walsh-Hadamard transform to the whole cover image, the Walsh-Hadamard coefficients are arranged in zigzag order and mapped into four quadrants-Q1, Q2, Q3, Q4. These four quadrants represent...
This paper presents a new perceptual watermarking model for Discrete Shearlet transform (DST). DST provides the optimal representation [10] of the image features based on multi-resolution and multi-directional analysis. This property can be exploited on for watermark embedding to achieve the watermarking imperceptibility by introducing the human visual system using Chou's model. In this model, a spatial...
With increase in the use of multimedia technology, the integrity of the digital images has become a major problem. The transformation between the soft and hard-copy of the image makes the problem even more complex. This paper proposes a new watermarking technique that is robust against geometrical and print-scan attacks. The method uses multiple domains to embed the message in the image, whereby watermarks...
In this paper, we propose a secure semi-fragile self-authentication watermarking technique based on embedding of perceptual hash derived from discrete wavelet transformation of jpeg2000 encoder. The original image is transformed on wavelet domain using JPEG2000 encoder. Then, we extract LL sub-band coefficients in order to perform perceptual hash. This hash will be embedded back into the same sub-band...
Recently there has emerged a lot of work that integrates the compressive sampling theory into watermarking schemes. The subtle changes in local space domain of the signal can lead to distinct disturbance in all the measurements. It will lead to the poor robustness when the watermark is directly embedded into the compressive sampling measurements. To solve this problem, a robust digital watermarking...
Images can be encrypted in spatial domain, frequency domain, or both. Most of the image encryption algorithms operate in spatial domain. Encryption in frequency domain has an advantage of being resistante to many image processing operations. This paper presents an image encryption algorithm in frequency domain using a chaotic permutation. Because of the images represented in JPEG format, then to increase...
The authors propose a robust watermark method to cope with the situation when double attacks simultaneously occur. Under a JPEG compression attack and cropping attack whose arbitrary positions to be attacked are assumed. Experiments with a heavy JPEG compression rate of 1/33 show a satisfactory detection ratio of 99.9%.
This paper presents an image hashing algorithm using robust features from jointed frequency domains. Extracted features are enciphered using a secure chaotic system. The proposed hashing scheme is robust to JPEG compression with low quality factors. This scheme also withstands several image processing attacks such us filtering, noise addition and some geometric transforms. All attacks were conducted...
This paper proposes a robust watermarking approach based on Discrete Cosine Transform (DCT) domain that combines Quick Response (QR) Code and chaotic system. When embed the watermark, the high error correction performance and the strong decoding capability of QR Code are utilized to decode the text watermark information which improves the robustness of the watermarking algorithm. Then the QR Code...
This paper proposes a robust watermarking approach based on Discrete Cosine Transform (DCT) domain that combines Quick Response (QR) Code and chaotic system. When embed the watermark, the high error correction performance and the strong decoding capability of QR Code are utilized to decode the text watermark information which improves the robustness of the watermarking algorithm. Then the QR Code...
In this paper we developed a steganographic method for image protection on Facebook social network. The method hides additional information such as a logo or serial number. Uploading the images on the social network has induced image degradation on the original images. Based on the analysis of this attack we developed a method based on the discrete cosine transform — DCT where additional information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.