The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Depth-Image-Based Rendering (DIBR) is an effective 3D image generation method. It has been widely used by virtue of its low bandwidth requirements and depth adjustment capability. However, the development of an effective copyright protection scheme of DIBR images remains a challenging task. Digital watermarking has been applied with a great success in recent years to provide copyright protection for...
Steganography is a process of concealing the secret information into cover object such as text, audio, image, and video. In this paper, we propose a new treatment of Cuckoo Search (CS) algorithm to solve the problem of video steganography. CS is a metaheuristic search algorithm which was recently devolved by Xin-She Yang and Suash Deb in 2009, inspired by the cuckoo bird breeding behavior. The suggested...
In this paper, we propose a new hybrid method for image steganography by using discrete curvelet transform and least significant bit (LSB). The proposed method is called Hybrid Curvelet Transform and Least Significant Bit (HCTLSB). In HCTLSB, the curvelet denoising is applied as a preprocessing step in order to remove the noise from the cover image. The cover image is transformed by applying the discreet...
This manuscript presents a watermarking method based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) with the Advanced Encryption Standard (AES) algorithm encryption applied on medical image. The proposed schema will be developed to increase the protection and robustness along with security. In our algorithm, after decomposing the original image into four sub-bands in the...
Speech Recognition has proven its significance in various online and offline applications including the authentication systems, translators, voice commander, etc. But as the voice is captured from some instrument it suffers from various impurities because of technical faults and environmental disturbance. These all noise criticalities degrade the accuracy of speech recognition methods. In this paper,...
Due to advanced tools available in computer technology, it is possible for unknown users to access the digital multimedia data. In order to protect important data from unauthorized people, this paper proposed a novel watermarking technique for color images. The proposed technique uses a unique combination of HL sub-band of Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD). The...
In this paper, we propose an intelligent audio watermarking approach based on QR factorization in wavelet domain by exploiting Multi-objective Particle Swarm Optimization (MOPSO). First, the audio signal is decomposed into low and high frequency ranges by using Discrete Wavelet Transform (DWT). The low frequency part is then segmented into 2-D blocks and QR factorization is applied to each one. The...
This paper presents a digital audio watermarking scheme that can embed imperceptible and robust watermark image into the audio signal. The watermarking process is performed in discrete wavelet domain by applying the QR factorization on 2-D blocks of low frequency part. The watermark bits are inserted in each block by quantizing the coefficients of resulting R matrices. A particle swarm optimization...
Steganography can be defined as the art and science of concealing private data within a carrier that could be a video, an image, an audio or a text that acts as a cover medium. Many steganography techniques exist; each has its own advantages and limitations. Capacity, robustness and the overall level of security are among the main factors to assess the performance of steganography algorithms. Also,...
Digital audio watermarking still remains one of the most interesting techniques for multimedia copyright protection. In this paper, bat inspired optimization approach is exploited to design an optimal audio watermarking algorithm for copyright protection. First, the original audio signal is decomposed by the Discrete Wavelet Transform (DWT) into low and high frequency parts. The low frequency part...
The expansion of the Internet in the past years has rapidly enlarged the accessibility of digital data like digital audio, images and videos to the common community of people. The rapid development in information technologies has given an extended and easy access to digital data. Digital data is a major trend of business communication today. Therefore, copyright protection of digital data has been...
In this paper, an application for medical image encryption and watermarking to store patient information is proposed. By using scrambling algorithm, the 1st view patient information is hidden and require unique patient password to access a real image. For watermarking scene, a Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) are applied to non-overlapping block size 8×8 image pixels...
In this study chaos based digital watermarking scheme together with Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is proposed. In the proposed watermarking scheme, the cover image is decomposed to its sub-bands (LL, LH, HL and HH) by a common used frequency domain transform: DWT. Then, the SVD is directly applied to the all sub-bands of the decomposed cover image. The watermark...
Recording and monitoring of respiratory signal has a great importance in medical fields. Old methods for recording this signal are mostly expensive, affected from the environmental conditions and troublesome for the patient. Consequently, using indirect methods like ECG-derived respiratory signal (EDR) is an appropriate solution for reducing above problems. In this regard, multi resolution decomposition...
In this paper, we propose a blind digital multi- watermarking algorithm for the copyright protection and authentication of medical images. When medical images are transmitted and stored in hospitals, strict security, confidentiality and integrity are required to protect from the illegal distortion and reproduction of the medical information. Medical image watermarking requires extreme care when embedding...
The growth of network multimedia systems has expanded the demand for image copyright protection. Digital watermark is one approach which is often used for image copyright protection. However, there are limitations of robustness and confidentiality in the common digital watermarking algorithms to resist print-scan attacks. In this paper, a new method combining zero watermarking, blind watermarking...
Nowadays, with technological advancement, it is simple for miscreants produce unlawful multimedia information duplicates. Different methods for copyright insurance of free information are being produced every day. Digital watermarking is a procedure, where computerized inserting of the copyright data/watermark into the information to be ensured. The two different major methods for doing as such are...
Due to the current progress in Internet, digital contents (video, audio and images) are widely used. Distribution of multimedia contents is now faster and it allows for easy unauthorized reproduction of information. Digital watermarking came up while trying to solve this problem. Its main idea is to embed a watermark into a host digital content without affecting its quality. Moreover, watermarking...
This paper proposes a new scheme for secure digital watermarking and copyright protection of videos. The approach presented here is based on redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD). The video frames and the watermark are decomposed by RDWT, and the watermark is embedded into the subbands of the I-frames. The singular values of the I-frames are modified with...
Digital watermarking has become an important technique for copyright protection of multimedia contents. In recent years, Singular Value Decomposition (SVD) has been used as a valuable transform technique for robust digital watermarking. Designers mostly use dewatermarking tools such as Stirmark to prove the robustness of watermarking schemes. Distortions available in these tools usually degrade the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.