The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Document is unavailable: This DOI was registered to an article that was not presented by the author(s) at this conference. As per section 8.2.1.B.13 of IEEE's "Publication Services and Products Board Operations Manual," IEEE has chosen to exclude this article from distribution. We regret any inconvenience.
In this paper, we proposed a fragile watermarking scheme based on QR decomposition and sinusoid. The watermark was embedded into the image by modifying the elements of matrix R according to the properties of sine wave. To ensure the valid modification of matrix R, we built rules to define allowable modification ranges. In addition, we designed a two-phase tampering detection to decrease the false...
This paper deals with a blind hybrid digital watermarking algorithm for the copyright protection and authentication of magnetic resonance tomography images. Medical image watermarking requires extreme care when embedding watermark information in the medical images, to protect the image quality from being violated and to avoid the wrong diagnosis that might occur. The proposed algorithm contains robust...
Watermarks are used to protect the copyright of multimedia and help us to identify legitimate ownership. Imperceptibility and robustness are always prime concern for the watermarking researchers. Therefore, a simple but effective blind watermarking scheme would be what we expect. In this study, we present a kind of blind watermarking technique, which is based on inter-blocks estimation of the discrete...
Increasing demand and utilization of telemedicine require transmission of medical information and images over internet. Since authenticity of received images is crucial and patient's information should be included with minimum changes in images, robust watermarking schemes are needed. In this paper, we propose a robust watermark method that embeds patient's information outside the region of interest...
In this paper, we have used a method based on DWT-SVD to insert and extract the watermark in an .avi file using a gray scale image as watermark through four different approaches. Performance comparison of all this four methods has been presented in this paper. To achieve low pay load with high robustness was the aim of this work. The 3rd and 4th method presented in this paper uses scene change detection...
Digital watermarking is a technique to employ copyright protection and ensure the authenticity of the owner using a proof of ownership embedded in a multimedia file. The objective of this paper is to present a novel digital video watermarking scheme using dual watermark. The binary watermark image is distributed over audio samples in which first four samples of each frame are watermarked with 4 bits...
Slantlet Transform (SLT) is an improved performance from Discrete Wavelet Transform (DWT). Based on characteristic on SLT; piecewise linear, two zero moments, and power quality for data compression. Those characteristic proves efficiency of SLT. One of the characteristic of SLT named power quality is better than Discrete Cosine Transform (DCT). DCT has a good signal compression. Their capability for...
In the field of digital audio watermarking, the issue of optimizing imperceptibility, robustness and payload is still a big challenge. In this paper, the problem of optimizing the design parameters has been addressed by presenting a secure, robust and imperceptible blind audio watermarking algorithm with large payload. The proposed algorithm is designed using the singular values of SVD in detailed...
While a plethora of digital contents are daily generated and shared online, authorship verification has become an imperative task. In comparison to other media watermarking techniques, text watermarking is a more challenging task. The changes in text would strongly affect the visual form and the meaning, text might be very short (eg. social media posts) and it cannot be always converted into image...
Nowadays, protection of proprietary data has gained interest in various fields of technology; one of the methods of doing this is use of watermark. Previous methods has proved that use of Hybrid wavelet transform yields better result than use of orthogonal transforms. This paper proposes a new approach for digital video watermarking based on hybrid wavelet transforms. In this method, video frames...
A novel blind color image watermarking technique using singular value decomposition and principal component analysis is proposed in this paper. In addition to two most difficult challenges; robustness and imperceptibility, two other concerns; capacity and security are given special attention in designing the proposed technique. The use of principal component analysis causes improvement in terms of...
In this paper, puts forward a kind of video forensic method based on the source of authenticity and integrity using hash computation and multiple digital watermarking. The research including two parts, the first is the design of hash algorithm and multiple digital watermarking methods, the second is video sources of authenticity and integrity of judgment. Using hash value consistency to ensure the...
Innovative developments in computer technology has made distribution of data easier. But it has also put forth a new challenge to secure these multimedia data from privacy. In any kind of information system, data security and confidentiality services are generally required. In this paper we present a new secure audio watermarking technique based on Fast Fourier Transform (FFT) along with encryption...
With the increasing development of power communication and the application of wireless sensor networks in smart grid, how to protect the safety of a large number of grid data becomes a great challenge. Digital watermarking is a new technology in data security field. It has unique advantage for protecting the data in smart grid. The available watermarking algorithms usually separate copyright protection...
Nowadays, user localization in indoor environments is more necessary to build many location-based services. This paper presents a robust audio identification method for enhancing a real-time indoor localization system on a mobile device using the audio signals emitted by nearby loudspeakers. The proposed audio identification method deals with various noise distortions due to different noisy indoor...
This paper presents a blind digital watermarking algorithm based on spatial images. We study the theory and characteristic of singular value, scrambling the serial digital watermark images again which mapped out through the chaotic sequence. We divided the original carrier image into blocks, and deal with each small block with the singular value decomposition in order to extract various small singular...
This paper proposes a new approach for text watermarking that uses the semantic roles to embed watermark information. The technology of natural language processing is applied to find and label the three types of semantic roles A0, A1 and ADV in a text. A watermark message is converted into the hexadecimal Unicode and then compressed with the Huffman encoding to form a digit string that consists of...
Robustness of digital audio watermarking algorithm against serious signal processing attacks is a big challenge in the recent trends. Many works have been reported in this field claiming high payload with good imperceptibility but good robustness at acceptable perceptual rates is still needed to be addressed. In this paper, watermark is embedded in the wavelet transformation of audio signal by using...
High embedding capacity is desired in digital image watermarking. In this paper, we propose a novel rank-based image watermarking method to achieve high embedding capacity. We first divide the host image into blocks. Then the 2-D discrete cosine transform (DCT) and zigzag scanning is used to construct the coefficient sets with a secret key. After that, the DCT coefficient sets are modified using a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.