The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a data-hiding scheme for quality access control of digital images using a new model of quantization index modulation (QIM). An encoded binary watermark is embedded over N-mutually orthogonal signal points using QIM but without complete self-noise suppression. It is well known that due to insertion of external information, there will be degradation in visual quality of the host...
With the ever-increasing usage of internet, the availability of digital data is in tremendous demand. In this context, it is essential to protect the ownership of the data and to be able to find the guilty user. In this paper, a fingerprinting scheme is proposed to provide protection for Numeric Relational Database (RDB), which focuses on challenges like: 1. Minimum distortion in Numeric database,...
In this paper we propose a novel scheme for semifragile self-recovery based on iterative filtering of randomly sampled image sections. The scheme exhibits very good robustness against both malicious tampering and lossy JPEG compression with only slight deterioration of the reconstruction quality with attack strength. We describe the operation of the proposed scheme and present the results of its experimental...
This paper presents a VLSI architecture of rhombus interpolation based reversible watermarking by difference expansion. The proposed architecture have been implemented and tested on Xilinx Virtex-7 FPGA, Zynq SoC (System On Chip) and ultra-scale FPGA platforms. The system is based on the modified rhombus interpolation scheme to embed and extract the copyright protection for medical and military imaging...
The additional operation of retrieval of the cover image at the decoder is necessary for lossless watermarking system. Taking into account this major issue, efficient implementation of reversible image watermarking needs to be addressed. This can be solved using hardware implementation. This paper focus on the digital design with pipelined architecture of reversible watermarking algorithm based on...
Reversible watermarking (RW) is used to embed some useful information into digital content in a reversible manner, where the reconstruction of the original image is highly desirable. This reversibility is important for almost all sensitive image application domains such as medical and military fields. To this aim here we have proposed a hybrid algorithm that offers higher embedding bit rate with a...
The progress of internet technology, especially in medical, information can be transmission across in real-time allowing medical practice through tele-diagnosis. Meantime, ensuring the security of transmitted medical information, including between protection and reliability guaranties, becomes a challenging. This work presents an effective reversible data hiding technique for the medical imaging modalities...
Digital Image Watermarking is used to hide the copyrighted information as a watermark inside a Digital image, to identify the ownership. In this paper to ensure the security watermark is first encrypted by standard A5/1 algorithm. The encrypted watermark is encoded by repetition code to provide robustness against salt and pepper noise and embedded inside the cover image by modifying the least significant...
In this paper we propose robust watermarking schema for video files based on spread spectrum theory. The main concept relies on utilization of time as temporal dimension for spreading of watermark bits that are assigned to video frames. The second level spreading that is impartial to first level, uses different set of PN sequences within the video frames what allows to utilize multiple watermarking...
Reversible data hiding has emerged in recent years, and it has the fundamental requirement of reversibility. For reversible data hiding, secret information is embedded into original image with devised algorithms, and the marked image should be delivered to the decoder without any damage. For decoding, both the embedded secret and original image should be recovered perfectly. With these characteristics,...
Content-based authentication schemes are designed to integrity protect multimedia streams while allowing content-preserving manipulations. In this demo, we demonstrate generic attacks that exploit a common design flaw in existing content-based video stream authentication schemes. We show that existing schemes cannot detect content-changing attacks.
In this paper, we present a robust image watermarking approach to hide DNA sequence data into fingerprint templates for copyright protection based on the discrete wavelet transform. A multi-bit watermark, based on DNA data, is embedded into the low frequency sub-band of the fingerprint image. During the inverse process, we employ DNA decoding to extract the image signature from the watermarked image...
Lossless data hiding belongs to one major branch in information security researches. The major goal is to retain the lossless property of proposed algorithm, meaning that original image and embedded secret should be perfectly recovered at decoder. Based on the multi-round prediction of differences between original and marked images, enhanced amount of capacity can be obtained while retaining the acceptable...
In this paper, we propose a new angle quantization index modulation (AQIM) method, called the difference AQIM (DAQIM) method. The proposed method aims to improve the watermarking performance against gain attacks. Unlike the original AQIM method [1], the DAQIM method quantizes the difference of the two angles instead of the angles themselves. The experimental results demonstrate that our proposed method...
There are diverse hardware realization for digital watermarking of multimedia proposed in the literature. This paper focuses on the design and implementation of a fast FPGA(Field Programmable Gate Array) based architecture using reversible contrast mapping (RCM) based image watermarking algorithm. The specialty of this architecture attracts to the fact of clock-less encoder design and implementation...
In this modern world of Internet and with the development of digital communication and multimedia application, image security has become an important concern in storage and communication. A cryptography technique provides good strength for securing and protecting images essentially in the fields as medical, law enforcement and military. Reversible watermarking provides authentication, in which original...
In this paper, a high capacity digital audio reversible watermarking algorithm based on generalized integer transform is proposed. The proposed algorithm is built on top of a recently proposed reversible image watermarking scheme. The main challenges to customize an image watermarking scheme to work for audio domain are the differences between the structures of image and audio, the target of the scheme...
Traitor is a legitimate user in a content distribution system who facilitates illegal content access to unauthorized party. Naturally, there are two strategies that are likely used by the traitors to do violations. Firstly, the traitors may attempt to extract the decryption keys to construct a pirate decoder. Secondly, they may legally decrypt the content and then illegally redistribute the decrypted...
This paper presents a blind audio tampering localization method in the perceptual sparse domain using a novel Modified Improved Spread Spectrum (MISS) watermarking approach. Current methods of audio authentication lack the ability to localize the tampered part of the audio in the presence of desynchronization attacks such as time shifting, scaling, etc. Our proposed method is able to localize the...
A computationally inexpensive watermark schema for MPEG-4 AVC/H.264 streams that use local mark strength adjustment minimizing visible artifacts is presented. The local mark strength adjustment mechanism and watermark embedding mechanism operate on residual data. This approach minimize the number of operations needed for video bitstream decoding and subsequent watermarked video data encoding. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.