The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new adaptive watermarking algorithm leveraging combined knowledge of spatial and frequency domains to ensure the robustness and security of the embedded watermark and the transparency of the carrier image. The scheme makes use of the perceptual characteristics of human visual system and the local correlation of the image. The wavelet coefficients of the image are divided into...
Digital technology keeps falling prey to the ease with which the unauthorized reproduction and distribution of digital objects can be achieved. Research on copyright protection of digital data must counterbalance the failures of legal measures against digital piracy. Digital watermarking tops the list of technical countermeasures and recent research has focused on proposing watermarking methods for...
Development of fast watermarking schemes for all multimedia objects is crucial to the present day research in information security. Besides speed of execution minimizing the trade-off between visual quality and robustness is another important requirement of this research domain. In view of this, a newly developed single layer feedforward network (SLFN) commonly known as Bidirectional Extreme Learning...
Flexible usage and easy acquisition of image processing software has made "tamper localization in medical images" a popular area. Medical Image Watermarking (MIW), which is one of the recommended methods in this area, relies on embedding additional information into the original image. In general, the medical image is separated into two parts called ROI — Region of Interest and RONI — Region...
The current paper proposes a novel scheme for non-blind watermarking of images, making use of discrete wavelet transform (DWT), discrete time Fourier transform (DTFT), as well as singular value decomposition, or SVD. During the process of embedding, 1-level DWT is used to decompose the host image into its various frequency sub-bands. After this, the high-frequency sub band receives an application...
In this work, a new image watermarking algorithm on colour images is proposed. The proposed algorithm divides a cover image into three colour bands of red, green and blue. Then the following tasks are done on all three channels separately. First, Each colour band is divided into patches of small sizes then the entropy of each patch is calculated. At this step a threshold is found based on the average...
Due to the very fast growth of data in the last few decades, it is very important to provide new methods to secure these data. In this paper, we propose a new approach which will be able to mark digital images with an invisible and undetectable information, known as “watermark”. The originality of our approach, is based on orthogonal polynomial basis transform which consists of decomposing an image...
In this paper we have proposed a new image watermarking technique which consists in applying the Singular Values Decomposition (SVD) in LWT domain in order to insert the watermark image in the cover image. This technique also use signature in the embedding and extraction procedure. The obtained results from the application of the proposed technique on a number of images show clearly that this technique...
Digital Image Security is still or recent topic of research in computer science engineering. Images are sharing very frequently from one device to another device. Due to this functionality and features it is very complicated situation for all of the application users because users share their personal images publically. A very unsolvable problem is still there is no appropriate method for image security...
Digital watermarking technique is used to provide the intellectual property rights. This technique proves the proprietor of the content. The authentication and identification of the ownership protect the data from intruders. The copyright protection protects the multimedia data from modifying, illegal copying and removing the data. The binary image is taken as the watermark, it scrambles first and...
The rapid development of digital technology makes the faster and easier transmission of electronic data with very low cost. Watermarking is one of the methods proposed for data protection in the way that information is embedded in the image without reducing image quality, but watermark may appear against different attacks. There are different ways for dealing with attacks. This article is aimed to...
Video watermarking is the approach of adding insensible data to video content in order to protect the owner's right. One of the main important issues in watermarking operation is the watermarking robustness. The basic requirement in watermarking is resisting in front of distortion and initial attacks, which is commonly examined based on the data processing standards. Many methods have been proposed...
This paper examines means to achieve e-government documents security through the use of digital watermarking techniques. An effective algorithm is proposed such that a given e-government document is watermarked in the frequency domain by applying a second order Discrete Wavelet Transformation (DWT) followed by transformation of the document through matrix decomposition techniques such the Singular...
Nowadays consumers of worldwide can capture digital image and video scene using several multimedia devices such as smartphones, tablets and cameras. Thus, the data captured may be easily copied or transmitted without any control and as consequence the intellectual property of the owner can be infringed, causing economic or moral damages. This fact suggests the necessity to develop security tools such...
In this paper, combining with the zero-crossing rate and short-time energy of the audio frame characteristics, an algorithm based on BTC, Arnold and chaos scrambling encryption for seeking the audio frame suitable for the embedded watermark is proposed. And also, the energy is dynamically adjusted to determine the embedding strength so as to self-adaptively embed watermark in the audio frame. Furthermore,...
This paper presents an innovative authentication technique for medical images based on double watermarking technology. The proposed multi transform based watermarkingtechnique utilizes Arnold Transform(AT), Discrete Wavelet Transform (DWT) and Discrete Cosine transform (DCT) leading to an enhanced robust double water marking technique with semi – fragility (RDWTSF) for medical images. The proposed...
The audio watermarking systems are more challenge due to the lack of publicly available reference algorithms. It includes the robustness against acoustic path transmission is only evaluated. So this systems will gives the chance of digital watermarking to be used in many applications where such as e.g., second screen applications, audience measurement, and so on. In this paper introducing a simple...
This paper presents an improved reversible data hiding algorithm using digital images based on the histogram shifting technique. Proposed method can accurately recover the original image and extract the hidden data accurately. The highest two peak values of the host image's histogram are selected for data hiding. This embedding process is repeated again and again, to attain larger embedding capacity...
Watermarking has been a popular research area inrecent years due to its wide application. In this paper, a briefwatermarking algorithm based on Discrete Wavelet Transform(DWT) and Discrete Fourier Transform (DFT) is proposed. Inthe embedding process, we apply DFT to one of the sub-bandresulting from DWT. We embed the watermark image bydirectly modifying the coefficients of magnitude spectrum orphase...
Invisible digital watermarking is coming to be the most popular technology to protect digital copyright of multimedia data. Schemes based on Discrete Cosine Transform (DCT) are widely used in image or video digital watermarking. In this paper, we proposed a new method that simplify the previous DCT-based methods while more robust to common attacks than conventional methods. We get rid of traditional...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.