The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, we investigate the performance of different color spaces for watermarking purpose using quantization method through experimental analysis. We rely on imperceptibility and robustness as a measure of performance of a given color space and its different channels. Eight different color spaces are used in this work. The watermark is inserted into the LL3 subband for each channel of the color...
The robustness and invisibility is the most important evaluating indicator of digital watermarking system. Besides, the data that must be analyzed and calculated is large for the video watermark. Thus, for the video watermark, watermarking algorithm should not only have strong robustness but also have low time complexity. In this paper, we put forward the idea to implement a frequency domain digital...
How to resist combined geometric attacks effectively while maintain a high embedding capacity is still a challenging task for the digital watermarking research. An affine correction based algorithm is proposed in this paper, which can resist combined geometric attacks and keep a higher watermark embedding capacity. The SURF algorithm and the RANSAC algorithm are used to extract, match and select feature...
This paper introduces a new detector for digital watermarking based on dual-tree complex wavelet transform (DT-CWT). The DT-CWT benefits from the high directionality and shift invariance, which ensure the high efficiency of proposed method. The watermark is additively embedded in the magnitude components of DT-CWT coefficients. Also, the watermark detection is formulated as a binary hypothesis test...
In contrast to many image watermarking schemes, the suggested method is implemented in the JPEG compressed domain with no transcoding or decompression. Therefore, this scheme is highly efficient in real-time applications and suitable for multimedia information, which is rarely available in an uncompressed form. The proposed watermarking scheme is very flexible, and can be tailored to meet the requirements...
The use of Internet and new technologies have changed the way in which digital content is provided, unfortunately due to the ease with which such data can be copied and modified, the illegal copying of digital content has been notably increased. This problem has created the need to protect digital content to avoid the illegal use and handling of such information. The watermarking is one of the most...
At present, due to advancement in communication technology and internet, people are sharing images over social networking and other sites very efficiently but it has created problems regarding copyright protection and authentication of the images. In past 10–15 years, digital watermarking has been becoming a popular solution for these problems. Besides of being popular, it creates distortions in host...
As accessing medical images through web anywhere at any time is in demand, it is essential requirement to interpret and analyze the medical images accurately. The purpose of this paper is to present, digital watermarking technique for modern medical approaches with multiple objective optimization using Firefly algorithm in Discrete Wavelet Transform and Singular Value Decomposition domain with good...
Copyright protection for multimedia data owners is of crucial importance as the duplication of multimedia data has become easily with the advent of Internet and digital multimedia technology. Current digital watermarking techniques for preserving the product ownership are rule-based and not directly deal with the data synchronization, therefore their decoding performance reduces significantly when...
This paper, the robustness of the proposed watermarking algorithm over various attacks (speckle noise, salt & pepper noise, brightness, Gaussian noise, rotation & contrast) is verified. In the proposed embedding, the embedding carries with the wavelet & Singular value decomposition (SVD) transform coefficients of both the images (cover & watermark) & interpolation. Here the SVD...
Telemedicine enables expert diagnosis and better healthcare access to distant patients especially in remote or rural areas by allowing the transmission of medical images through telecommunication. Privacy of data being transmitted and the underlying technologies raise issues related to security. The paper proposes an algorithm for digital watermarking of medical images to ensure secure and confidential...
This paper proposes an inaudible and robust audio-information-hiding scheme based on the singular-spectrum analysis (SSA) and a psychoacoustic model. SSA is used to decompose the host signals into several additive oscillatory components. The hidden information is embedded into the host signals by modifying amplitudes of some oscillatory components. To satisfy the inaudibility, we propose a novel method...
Solar panels outer surface inspection is among the most challenging tasks which burden the solar plants supervisors. An automatic inspection based on image processing ensured by robots seems beneficial. In our approach, a robot equipped with an HD camera and a processing unit browses a set of solar panels (placed alongside). Afterward, the robot captures a series of successive images containing a...
The exponential growth in digital data over the internet has increased the requirement of a robust and high quality watermarking techniques. In general, the image watermarking techniques embed the binary or grayscale watermark into the cover image or into many multimedia images. In this method, variable visibility factor is used for the insertion of watermark into the low frequency component of the...
This paper presents a new embedding strategy to extend the performance bound of spread spectrum (SS) based watermarking by introducing more imperceptible distortions measured in the mean square errors (MSE). The potential of the host is sufficiently exploited and utilized to maximize the watermark robustness. This strategy is then realized in audio watermarking by adaptively inverting the host according...
According to time, so many researches have been proposed on invisible multiple watermarking. Basically, invisible video watermarking is the technique to hide relevant information into another host image, audio, text, and video. In this paper, invisible watermark is embedded by using DWT, LSB, DCT and Mojette. These techniques are based on some numeric parameters like PSNR (peak signal to noise ratio),...
This paper proposes a new image watermarking scheme based on Generalized Singular Value Decomposition (GSVD). This image watermarking method embeds the principal components of watermark image into the host image using a specific scaling factor to control the imperceptibility and robustness aspects. Using this strategy, the GSVD-based image watermarking has ability to avoid the false positive problem...
This paper presents digital watermarking for validating and protecting the integrity of digital Holy Quran in Portable Document Format (PDF). The need arises as minute alteration to text or content of Holy Scriptures could result in a devastating situation in the belief of the owners. By this research we have designed and evaluated a simple yet fragile and fidel image PDF digital watermarking technique...
In this paper, a video watermarking scheme is proposed to embed the watermarking with the depth sequences of the respective video frames for multi-view video plus depth (MVD) based 3D video sequences. To make the scheme invariant to 3D-HEVC compression attack, motion compensated temporal filtering (MCTF) is done over the video sequences to find motion-coherent connected pixels. Scale- invariant feature...
Camcorder based video copy attack has become a serious threat to the electronic movie distribution services. In literature, it is found that main distortions caused during cam-cording are frame blending and projection attacks. Though, several watermarking schemes exist to handle geometric distortions caused during cam-cording, very few of them are robust against temporal distortion. Based on the existing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.