The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Techniques based on discrete cosine transform (DCT) have been proposed for digital watermarking of audio signals; however, the watermark is susceptible to MP3 compression. This paper presents an effective audio watermarking technique based on energy balancing of DCT coefficients to recover the watermark from signal processing, such as compression, without compromising the intended effect of the original...
In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. In this paper we first present an efficient codec system for encoding a watermark number as a reducible permutation graph through the use of the self-inverting permutation which encodes the number and, then, we...
Reversible data hiding is a newly developed research field in digital rights management (DRM) applications. It is a branch in watermarking researches, with the characteristics of reversibility at the decoder. Secret information can first be embedded into original image, with algorithms designed by researchers, at the encoder. Next, image containing secret data is delivered to the decoder. After reception...
In this paper we propose an efficient and easily implemented codec system for encoding watermark numbers as reducible permutation flow-graphs. More precisely, in light of our recent encoding algorithms which encode a watermark value as a self-inverting permutation $\pi^*$, we present an efficient algorithm which encodes a self-inverting permutation as a reducible permutation flow-graph ...
One of the important problems in communication is sending specific data privately. In addition to cryptography which was used many years ago, methods such as data hiding have been introduced in recent years. In data hiding, specific data is embedded in another signal, which is known as a host signal that can be in the form of video, image and audio. Because of narrow bandwidth limitation, speech signal...
Nowadays, multimedia data protection widely uses data hiding technology like Digital Watermarking or steganography. Among the large offer of watermarking techniques several ones are now based on the side information scheme proposed by Costa. These techniques mainly use scalar quantization for embedding a given information. Such solutions have good properties in terms of robustness and capacity but...
In this paper, the improved spread spectrum (ISS) modulation is modified and extended to cancel the host interference in the context of watermark decoding with unmatched filtering, where the reference sequence at the watermark decoder does not match with the embedded sequence. Then a robust and transparent audio watermarking scheme based on this extended ISS and a psychoacoustic model is proposed...
Flow watermarking 1 is an efficient technique for linking packet flows that helps thwart various attacks in networks such as over the Internet. Current state-of-the-art water-marking schemes withstand packet losses at the expense of compromising invisibility. We present an invisible flow watermarking scheme that can endure large numbers of packet losses. To maintain invisibility, our scheme embeds...
The paper proposes a new approach for evaluating the security levels of digital watermarking schemes, which is more in line with the formulation proposed in cryptography. We first exhibit the class of equivalent decoding keys. These are the keys allowing a reliable decoding of contents watermarked with the secret key. Then, we evaluate the probability that the adversary picks an equivalent key. The...
This paper describes the basic idea of a novel Digital Rights Management(DRM) method which is composed of an incomplete cryptography using invariant huffman code length feature and the user identification mechanism to control the quality of the digital contents. We adopt the huffman code length feature of the DCT coefficient in the JPEG codec to the implement incomplete cryptography. The encoding...
Conventional secret message passing methods embed a message in the cover-text, so the receiver must use stego-text to extract the message content. In contrast, this paper proposes a new paradigm in which the receiver does not necessarily require stego-text to retrieve the message content. Under the proposed approach, the sender can produce keys without modifying the cover-image, and the intended recipient...
Generally, DRM(Digital Rights Management) system is achieved with individual function modules of cryptography, watermarking and so on. In this typical system flow, all digital contents are temporarily disclosed with perfect condition via decryption process. This paper describes the fundamental idea of a novel DRM method which is composed of an incomplete cryptography and user identification mechanism...
In this paper, a halftoning-based watermarking scheme with high data capacity and image quality is presented. Three types of watermarks of various pixel-depths, including 1-bit, 2-bit, and 3-bit, are able to be embedded without prominently damaging the image quality. To achieve high marked image quality, the parallel-oriented high efficient Direct Binary Search (DBS) halftoning is adopted to cooperate...
This paper describes an informed unipolar spread spectrum (SS) modulation to improve the performance of SS-based watermark extraction with self-synchronization. Compared with bipolar SS, unipolar SS, realized by employing a pair of orthogonal codes to represent the watermark bits, is more robust against the distorted correlation between the received watermarked signal and the reference. The informed...
The Davey-MacKay (DM) construction is a concatenated coding scheme for channels which introduce insertion, deletion and substitution errors. The inner code recovers synchronization while the outer code corrects substitution errors due to imperfect synchronization from the inner decoder. In the original DM construction, nonbinary LDPC codes were used as the outer codes. We show that when the insertion...
In this paper, we propose the FPGA implementation of a watermarking algorithm in the spatial domain. The paper put emphasis on Quantization Index Modulation based watermarking approach using dither sequences. The cost-effective data embedding algorithm can conceal watermark into original cover image coming from a sensor more rapidly than software implementation and the embedded image is effortlessly...
This paper presents a key based generic model for digital image watermarking. The model aims at addressing an identified gap in the literature by providing a basis for assessing different watermarking requirements in various digital image applications. We start with a formulation of a basic watermarking system, and define system inputs and outputs. We then proceed to incorporate the use of keys in...
With the rapid development and the richer content of the Internet, the copyright protection of the works should be further developed. The watermarking has become a possible solution. In this paper, firstly, a novel hybrid multiplicative rule is presented and utilized to embed the watermark into DWT coefficients controlled by the secret key. Secondly, the optimum and locally optimum hybrid multiplicative...
A method of reversible video image regions of interest anonymization for applications in video surveillance systems is described. A short introduction to the anonymization procedures is presented together with the explanation of its relation to visual surveillance. A short review of state of the art of sensitive data protection in media is included. An approach to reversible Region of Interest (ROI)...
This paper proposes a full fidelity watermarking on JPEG bitstreams. That is, without a designated decoder/player, the watermarked bitstream can be decompressed to the original one. To this end, the scheme modifies the JPEG Huffman tables and the bitstream synchronically according to the watermark. Thus it is unnecessary for the JPEG decompressor to recover DCT coefficients because they are not modified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.