Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Watermarking is an important technical way to realize copyright protection of intellectual property. The traditional video watermarking can cause distortion to host video in a certain extent, and has a weak robustness against strong geometric attacks. Firstly, a Nonnegative Matrix Factorization with Sparseness Constraints on Parts (NMFSCP) method is proposed in this paper. Secondly, the NMFSCP is...
Image watermarking has been generally acknowledged as a pertinent technique for improving authenticity, integrity and data security where medical images are transmitted, stored, retrieved across networks. An improved the quality of remote medical services strictly depends on the ability of the techniques used to ensure ethics and protect the transmitted medical secrets. On the one hand, medical image...
Video Watermarking is a prominent technique used to provide the authentication to the multimedia data such as audio, video and text. It is also used to resolve the copy right protection and ownership problem. The proposed method is used to provide the solution for copy right protection in video data. Here the different mathematical transforms like DWT and SVD are combined for the purpose of achieving...
In the present scenario Digital image watermarking is a powerful method for solving the problems of tamper detection, rightful ownership, copyright protection and content authentication. In this papera secure hybrid digital image watermarking scheme based on Redundant Discrete wavelet transform (RDWT), Discrete Cosine Transform (DCT) and Singular value decomposition (SVD) in zigzag order with Arnold...
In today's world of digital communication, as technology progresses, there is more and more attention required on image security. Many visual cryptography algorithms have been suggested and digital watermarking in association with visual cryptography is also proposed for more image security. An image watermarking model based on progressive visual cryptography is proposed to decide optimal number of...
Medical images could be acquired from analytical modalities like Digital Radiography, Nuclear medicine bone scan, Ultrasound Scan Images, Computer Tomography, Magnetic Resonance Imaging, and Patient's Record management system. The progresses in combined use of media and information technology afford us to utilize the new behavior to allocate right to use and accumulate medicinal statistics. This has...
In this modern era, storing and transmitting information is by far done as a digital object. But the greatest disadvantage in digital data transmission is the fact that innumerable copies of the digital file can be made and is susceptible to be misused. This leads to the worldwide problem of copyright protection, copy protection and content authentication. Various Steganographic techniques and algorithms...
This paper proposes a local digital image watermarking method based on robust feature extraction. A robust feature extraction method is proposed based on DAISY to extract feature regions. Each feature region is decomposed into approximation and details sub-bands by wavelet transform and the watermark is then embedded into and/or extracted from the approximation coefficients. Spread Transform Dither...
In this work we propose a new image watermarking approach using data modulation. This technique consists at first step in getting the first color in case of RGB image which is a two dimensional matrix. Then the Discrete Cosine Transform (DCT) is applied to that matrix and the Watermark signal is inserted into the DCT values. This Watermark signal is obtained after amplitude modulation of the original...
In the present scenario, because of the great success of the internet, the exchange of digital media over the internet became easy. We can easily transmit audio, video and images. But security and copyright protection of this digital media became a serious issue. So an emerging technique, known as digital watermarking, is used. It is widely used for protecting digital media from duplicacy and unauthorized...
Video watermarking is one of the inspiring and challenging fields for the researchers to prevent piracy and counterfeiting (duplicate) of digital videos because every day the technology is changing at a very faster rate and the chances of misuse of videos are threatening. This paper presents review of various 2D & 3D video watermarking technologies based on various applications. In the first approach...
This paper proposes the use of perceptual hashing to improve minutiae extraction of fingerprint images that tolerates context-preserving operations. The hash extraction is performed after wavelet transform and singular value decomposition (SVD). The performance evaluation of this approach has been assessed using various metrics such as SSIM and PSNR. Experimentally, it has shown robustness against...
Digital communication facilitates us to transmission of data from transmission station to receiver station. Digital data required different multimedia techniques for transferring and maintaining the quality of digital data. As we know that, digital data are in various formats like text, audio, video, image, graphics, and message or in animated format. During transmission of digital data through channel,...
The digital image watermarking technology is widely used to protect intellectual property and to authenticate digital contents in the network environment. The aim of the paper is to invoke the improved Laplacian Pyramid transform to develop a new image watermarking scheme. Specifically, the host image is decomposed and reconstructed by using the improved Laplacian Pyramid transform. Then, the mid...
A 3D model watermarking against affine transformation is proposed in this paper. Firstly, the original watermark is embedded in an image, then we compare the watermarked image with the original watermark image and embed the watermark information into three-dimensional mesh model with distance between vertices and the center of a model. The algorithm has strong robustness against attacks, such as scaling,...
The large structure of dataset for sharing for particular target or authenticate target but there are some other parties that can attack on data easily and use that data illegally and can claim that data ownership. Attacker can gain ownership on that sharing data. Due to this original data get modified and quality of data also reduced so this original data is not useful for any extraction information...
In this paper we use the Dual Tree Complex Wavelet Transform (DT - CWT) to watermark an image using a binary watermark which is blind in nature. It was observed that when Just Noticeable Difference (JND) of the image is used as a strength multiplier of the watermark while embedding the binary image in the DT - CWT coefficients of the host image, there is a significant improvement in the robustness...
Digital format of data has become very popular now a days with the advancement of technology. But the problem arises when unauthorized copying and distribution of these digital contents took place. As a result the question of copyright protection came. In order to cope with this situation, the era of Digital Watermarking came where the authorized owner hides some kind of information in an imperceptible...
The authenticity of content is crucial factors for solving the problem of copying, distributing and Modifying, the intellectual properties in an illegal way. Watermarking can resolve this problem of above properties. In this paper considering a robust image Watermarking technique by using Nonsub sampled contourlet transform (NSCT) and discrete Cosine transform (DCT). This is called hybrid watermarking...
The fragile watermarking technique presented in this paper is based on the pixel information. The authentication data is calculated from the pixels by using Local Binary Pattern concept. Spatial information of pixels is used for watermark calculation and it is having spatial relationship of pixels. The authentication information is calculated for the block of 3×3 using LBP operator and we have used...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.