Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Differential pulse-position modulation (DPPM) shows significant power and bandwidth efficiency in wireless optical communications and does not need symbol synchronization, but suffers from serious insertion/deletion errors if the low-complexity symbol-by-symbol detection is used. In this paper, the DPPM transmission scheme combining the watermark with the low-density parity-check (LDPC) code is proposed...
This paper presents a hardware implementation of a reversible watermarking system that can insert invisible, semi-fragile watermark information into digital image in real time. A content dependent binary watermark is generated based on Discrete Cosine Transform (DCT) coefficients of a set of blocks (8×8) that are selected pseudo randomly on the basis of the key supplied. The binary watermark is then...
In this paper, an improved lossless data hiding method with histogram shifting for medical images is proposed. In general, medical images consist of many pure black and white points. In the previous studies, it may need a lot of data as a location map to reconstruct the watermark and the cover image. To solve this problem, we present a new method to record the location map. We use two bits for each...
Digital watermarking is act of hiding data within a digital image in order to resolve issues related to authentication and copyrights. Reversible watermarking is suitable in sensitive applications like medical images, as it can recover original image after extraction of the watermark. Many reversible watermark schemes have been proposed earlier but there are very few hardware implementations available...
Content fingerprinting and digital watermarking are techniques that are used for content protection and distribution monitoring and, more recently, for interaction with physical objects. Over the past few years, both techniques have been well studied and their shortcomings understood. In this paper, we introduce a new framework called active content fingerprinting, which takes the best from these...
This paper is mainly devoted to investigating the connection between binary reversible data hiding and permutation coding. We start by undertaking an approximate combinatorial analysis of the embedding capacity of reversible watermarking in the binary Hamming case, which asymptotically shows that optimum reversible watermarking must involve not only “writing on dirty paper”, as in any blind data hiding...
We propose a new type of score function for Tardos traitor tracing codes. It is related to the recently introduced tally-based score function [28], but it utilizes more of the information available to the decoder. It does this by keeping track of sequences of symbols in the distributed codewords instead of looking at columns of the code matrix individually. We derive our new class of score functions...
In this paper, a double modification testing (DMT)-based reversible watermarking scheme for use in increasing the capacity of CT images is presented. The scheme works by dividing the image into two parts (region of Dot and region of Cross). All pixels in the two regions are checked according to the definition of DMT i.e., expandable pixel, shiftable pixd, non-expandable pixel and non-shiftable pixel...
Spread spectrum (SS) modulation is one of the most commonly used methods for data hiding. However, the capacity of SS-based methods is rather limited. To improve the hiding efficiency, this paper presents a method that employs the parallel combinatory spread spectrum (PCSS), in which the hidden data can be transmitted in parallel with a combination of a few pseudo noise sequences. An informed embedding...
The paper presents a new technique for archiving and protecting content of visual medical information. A special format is developed based on a new Inverse Pyramid decomposition. The images are archived with the highest quality but their restoration is performed in accordance with the application. The image content is protected by inserting multiple fragile watermarks that can be extracted by authorized...
Reversible data hiding has attracted more and more attention in recent years. With reversible data hiding, it requires embedding secret data into original image with devised algorithm at the encoder, and marked image can then be delivered to the decoder. At the decoder, both the secret data and original image should be perfectly separated from marked image to keep the reversibility. There are several...
Code phase shift keying (CPSK) is an efficient M-ary modulation that can be applied to spread spectrum (SS) based watermarking to improve the watermark payload. However, the host media acts as interference that degrades the watermark robustness, especially in high-payload applications. In this paper, an informed embedding method for CPSK-based watermarking is proposed. The host is utilized at the...
This paper proposed an advertising system with the combination of cloud computing and audio watermarking which provided an innovative advertising method with a full utilization of background music played in public places. The system was illustrated in detail from the level of technology, architecture and application, and had been proved feasible with the real time response experiments based on the...
Progressive transmission of multimedia can be commonly encountered in multimedia communications. In this paper, we develop the reversible data hiding scheme for ownership protection of color images, which is suitable to meet the characteristics of progressive transmission. With progressive transmission, data can be partitioned into base and enhancement layers. We consider carefully altering the difference...
E-Learning system provides a new platform for learning and is becoming more and more popular nowadays. As part of E-Learning, digital multimedia contents like video lectures, seminar talks are made available to the learners through the internet. The teachers or the authority upload videos in the file repositories of E-learning systems. It is not so difficult to copy such files without quality loss...
Software watermarking involves embedding a unique identifier or, equivalently, a watermark value, within a software to discourage software theft; towards the embedding process, several graph theoretic watermarking algorithmic techniques encode the watermark values as graph structures and embed them in application programs. Recently, we presented an efficient codec system for encoding a watermark number...
the success of audio steganography techniques is to ensure imperceptibility of the embedded secret message in stego file and withstand any form of intentional or un-intentional degradation of secret message (robustness). Crucial to that using digital audio file such as MP3 file, which comes in different compression rate, however research studies have shown that performing steganography in MP3 format...
Reversible watermarking (RW) is one of the best possible solutions for content authentication of a digital data. In RW the decoder may recover the hidden and original information losslessly. Existing works suggest that prediction error expansion (PEE) based RW scheme ensures higher embedding capacity with low imperceptibility. In general, PEE based RW schemes use a single predictor. But this is seen...
This paper proposes a new embedding scheme for multibit difference expansion reversible watermarking. The prediction error expansion (PEE) schemes expand n times the difference in order to embed up to log2 n bpp. For natural images, this capacity cannot be achieved because overflow or underflow is generated by the embedding process. The proposed method aims to increase the capacity of the embedded...
In this paper an adaptive feedback based Reversible Watermarking (RW) algorithm using Difference Expansion (DE) is designed for gray-scale still pictures. The algorithm obtains automatically the highest payload size and the corresponding embedding threshold and also determines the best watermarked picture for an input cover picture with respect to the quality metric Peak-Signal-to-Noise Ratio (PSNR)...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.