The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel watermarking scheme is proposed for up-sampling based multiple description coding frame in this paper. Secret information is embedded in the DWT image. Up-sampling algorithm is applied on transformed image to introduce some redundancy between different channels. Good performance of the new frame to against noise and to resist the compression attacks is shown in the experimental results.
Reversible data hiding is one of the popular topics in watermarking researches, and it belongs to the branch of digital rights management (DRM) applications. Similar to conventional watermarking techniques, for reversible data hiding, at the encoder, secret information can be embedded into original images, and the marked image can be obtained. Different from conventional watermarking, due to the term...
The energy of audio segment is adaptively judged by energy threshold based on traditional echo hiding algorithm so that echo signal is selectively added. Compared with the traditional algorithm by determining the amount of embedded data depending on the length of the audio signal, the new algorithm adaptively embed data according to the energy of audio segment so as to improve the problem of high...
Recently, a patchwork-based audio watermarking scheme has been proposed in [1], which embeds watermarks by modifying the means of absolute-valued discrete cosine transform (DCT) coefficients corresponding to suitable fragments. This audio watermarking scheme is more robust to common attacks than the existing counterparts. In this paper, we presents a detailed analysis of this audio watermarking scheme...
In this paper, we present a dual audio watermarking system that ensures the double constraints robustness and high embedding capacity. The proposed technique tens to incorporate two different watermarks in a digital audio signal with a view to reinforce of the copyright protection and embed an important amount of information. To meet this end, we show how Spread Spectrum and Quantization-Based Watermarking...
Halftone image watermarking has been explored and developed rapidly over the past decade. However, there are still issues to be studied. This paper presents a data hiding method called Data Hiding by Dual Color Conjugate Error Diffusion (DHDCCED) to hide a binary secret pattern into two error diffused color halftone images, such that when the two color halftone images are overlaid, the secret pattern...
In this paper we make contributions to a non-blind multiple watermarking scheme that proceeds by embedding a binary image in the discrete wavelet transform bands of a gray scale image. Unlike the common wavelet based watermarking techniques, the proposed scheme lies essentially on marking the approximation and diagonal bands of the discrete wavelet transform (DWT) of the cover image achieving a better...
Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics it is possible to confirm or establish an individual's identity based on “who she is”, rather than by “what she possesses” (e.g., an ID card) or “what she remembers” (e.g., a password). Today, it is becoming more and more...
AC-3 audio compression find applications in home cinema, DVD, BD and digital television. This paper addresses the challenge of transparently watermarking AC-3 bit streams instead of the conventional decoding — baseband watermarking — re-encoding approach. We discuss the alternate possibilities to embed watermarks by altering the MDCT coefficients delivered in the bit stream, which consists of mantissas...
This paper proposes a new fingerprinting decoder based on the Markov Chain Monte Carlo (MCMC) method. A Gibbs sampler generates groups of users according to the posterior probability that these users could have forged the sequence extracted from the pirated content. The marginal probability that a given user pertains to the collusion is then estimated by a Monte Carlo method. The users having the...
Medical images play a significant role in diagnosis at the present time. The diagnosis information is also important particularly in patient treatment data, the results and other confidential information which cannot be disclosed according to judgment and ethics. These data are exported with the images and will be protected generally. This article presents a high-efficiency technique for hiding information...
With the development of the cloud environment, the multi-copyright protection of the works should be further developing. The multi-watermarking is becoming a possible solution. In this paper, firstly, one novel hybrid multi-watermarking rule is proposed, and is used to embed the watermark into DWT domain. Secondly, corresponding to the hybrid embedding rule, the novel optimum hybrid additive multi-watermarking...
This paper describes a novel color hardcopy watermarking embedding. The proposed color embedding provides high transparency by modulating the watermark into the value and saturation color components of the document. After the color document is printed and distributed, the message is decoded by scanning the document and applying the proposed post processing based on a Laplacian of Gaussian whitening...
Spread-spectrum communication encompasses a number of signalling techniques in which the transmitted bandwidth is significantly larger than required by the data rate and the transmitted bandwidth is determined by a function independent of the message that is known to both sender and receiver. Originally intended to increase resistance to jamming and lowering the probability of interception, its properties...
In the present digital world, Digital Rights Management (DRM) is essential to enforce persistent data protection right from the moment it is published. In spite of a need for DRM there are significant weaknesses in the current technology. Generally, DRM system is achieved with individual function modules of cryptography, fingerprinting and so on. In this typical system flow, all digital contents are...
In this paper, we present a method for hiding information in a conventional two-dimensional (2D) code that maintains backward compatibility with conventional 2D code readers. This is achieved by segmenting each cell into subcells that store confidential information.
This paper describes an experimental system integration of Digital Rights Management (DRM) architecture and fingerprinting which is composed of an incomplete cryptography scheme using invariant offset huffman code length feature and the user identification mechanism to control the quality of the digital contents. We adopt the AC-coefficent huffman code length feature of the DCT coefficient in the...
The modulation method base on Reed-Solomon code for watermarking technology is proposed here. The DC, low-frequency coefficients, the inter-block correlation and Reed-Solomon code will be combined in order to develop a robustness watermarking. In other words, the inter-block correlation and the DC, low frequency coefficients which are belongs to the important parameter in the image are used to output...
In this paper, we propose an error concealment technique for H.264 coded videos. The algorithm is targeted at compressed videos degraded after packet losses caused by transmission over an unreliable channel. We use a combination of watermarking and half toning (dithering) techniques. At the encoder side, a dithered version of each video frame is embedded into the video using a watermarking technique...
In recent time protection of intellectual properties is a concern. To protect the image and video from the unauthenticated access or tampering, watermarking is adopted as a solution. Real-time implementation of various watermarking techniques has been utilized in broadcasting. In this paper we have a spatial domain Spread Spectrum (SS) watermarking scheme which effectively eliminates security problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.